diff --git a/2018/19xxx/CVE-2018-19506.json b/2018/19xxx/CVE-2018-19506.json index 1d4726b0905..c4ae423a82c 100644 --- a/2018/19xxx/CVE-2018-19506.json +++ b/2018/19xxx/CVE-2018-19506.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://github.com/security-provensec/CVE-2018-19506/blob/master/Zurmo_PS.pdf", + "name" : "https://github.com/security-breachlock/CVE-2018-19506/blob/master/Zurmo_PS.pdf", "refsource" : "MISC", - "url" : "https://github.com/security-provensec/CVE-2018-19506/blob/master/Zurmo_PS.pdf" + "url" : "https://github.com/security-breachlock/CVE-2018-19506/blob/master/Zurmo_PS.pdf" } ] } diff --git a/2018/19xxx/CVE-2018-19507.json b/2018/19xxx/CVE-2018-19507.json index 7ab7a8c6b55..c7fcfcd8406 100644 --- a/2018/19xxx/CVE-2018-19507.json +++ b/2018/19xxx/CVE-2018-19507.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://github.com/security-provensec/CVE-2018-19507/blob/master/Persistent-XSS.pdf", + "name" : "https://github.com/security-breachlock/CVE-2018-19507/blob/master/Persistent-XSS.pdf", "refsource" : "MISC", - "url" : "https://github.com/security-provensec/CVE-2018-19507/blob/master/Persistent-XSS.pdf" + "url" : "https://github.com/security-breachlock/CVE-2018-19507/blob/master/Persistent-XSS.pdf" } ] } diff --git a/2018/19xxx/CVE-2018-19508.json b/2018/19xxx/CVE-2018-19508.json index 765804215a1..241a9f4dbed 100644 --- a/2018/19xxx/CVE-2018-19508.json +++ b/2018/19xxx/CVE-2018-19508.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://github.com/security-provensec/CVE-2018-19508/blob/master/Persistent-XSS.pdf", + "name" : "https://github.com/security-breachlock/CVE-2018-19508/blob/master/Persistent-XSS.pdf", "refsource" : "MISC", - "url" : "https://github.com/security-provensec/CVE-2018-19508/blob/master/Persistent-XSS.pdf" + "url" : "https://github.com/security-breachlock/CVE-2018-19508/blob/master/Persistent-XSS.pdf" } ] } diff --git a/2018/19xxx/CVE-2018-19596.json b/2018/19xxx/CVE-2018-19596.json index 31d16095714..602a0f181bb 100644 --- a/2018/19xxx/CVE-2018-19596.json +++ b/2018/19xxx/CVE-2018-19596.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://github.com/security-provensec/CVE-2018-19596/blob/master/Zurmo_PS%20(1).pdf", + "name" : "https://github.com/security-breachlock/CVE-2018-19596/blob/master/Zurmo_PS%20(1).pdf", "refsource" : "MISC", - "url" : "https://github.com/security-provensec/CVE-2018-19596/blob/master/Zurmo_PS%20(1).pdf" + "url" : "https://github.com/security-breachlock/CVE-2018-19596/blob/master/Zurmo_PS%20(1).pdf" } ] } diff --git a/2018/19xxx/CVE-2018-19597.json b/2018/19xxx/CVE-2018-19597.json index 44e5d402483..8b9024677e7 100644 --- a/2018/19xxx/CVE-2018-19597.json +++ b/2018/19xxx/CVE-2018-19597.json @@ -53,9 +53,9 @@ "references" : { "reference_data" : [ { - "name" : "https://github.com/security-provensec/CVE-2018-19597/blob/master/cmssms.pdf", + "name" : "https://github.com/security-breachlock/CVE-2018-19597/blob/master/cmssms.pdf", "refsource" : "MISC", - "url" : "https://github.com/security-provensec/CVE-2018-19597/blob/master/cmssms.pdf" + "url" : "https://github.com/security-breachlock/CVE-2018-19597/blob/master/cmssms.pdf" } ] } diff --git a/2018/20xxx/CVE-2018-20240.json b/2018/20xxx/CVE-2018-20240.json index e567c250b3a..f8144315af6 100644 --- a/2018/20xxx/CVE-2018-20240.json +++ b/2018/20xxx/CVE-2018-20240.json @@ -1,68 +1,69 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@atlassian.com", - "DATE_PUBLIC": "2019-02-15T00:00:00", - "ID": "CVE-2018-20240", - "STATE": "PUBLIC" + "CVE_data_meta" : { + "ASSIGNER" : "security@atlassian.com", + "DATE_PUBLIC" : "2019-02-15T00:00:00", + "ID" : "CVE-2018-20240", + "STATE" : "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "Fisheye and Crucible", - "version": { - "version_data": [ + "product_name" : "Fisheye and Crucible", + "version" : { + "version_data" : [ { - "version_value": "4.7.0", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "4.7.0" } ] } } ] }, - "vendor_name": "Atlassian" + "vendor_name" : "Atlassian" } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "The administrative linker functionality in Atlassian Fisheye and Crucible before version 4.7.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the href parameter." + "lang" : "eng", + "value" : "The administrative linker functionality in Atlassian Fisheye and Crucible before version 4.7.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the href parameter." } ] }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "Cross Site Scripting (XSS)" + "lang" : "eng", + "value" : "Cross Site Scripting (XSS)" } ] } ] }, - "references": { - "reference_data": [ - { - "name" : "https://jira.atlassian.com/browse/CRUC-8381", - "refsource" : "CONFIRM", - "url" : "https://jira.atlassian.com/browse/CRUC-8381" - }, - { - "name" : "https://jira.atlassian.com/browse/FE-7163", - "refsource" : "CONFIRM", - "url" : "https://jira.atlassian.com/browse/FE-7163" - } ] + "references" : { + "reference_data" : [ + { + "name" : "https://jira.atlassian.com/browse/CRUC-8381", + "refsource" : "CONFIRM", + "url" : "https://jira.atlassian.com/browse/CRUC-8381" + }, + { + "name" : "https://jira.atlassian.com/browse/FE-7163", + "refsource" : "CONFIRM", + "url" : "https://jira.atlassian.com/browse/FE-7163" + } + ] } } diff --git a/2018/20xxx/CVE-2018-20241.json b/2018/20xxx/CVE-2018-20241.json index adec3ffa696..0f5b174a305 100644 --- a/2018/20xxx/CVE-2018-20241.json +++ b/2018/20xxx/CVE-2018-20241.json @@ -1,59 +1,59 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@atlassian.com", - "DATE_PUBLIC": "2019-02-15T00:00:00", - "ID": "CVE-2018-20241", - "STATE": "PUBLIC" + "CVE_data_meta" : { + "ASSIGNER" : "security@atlassian.com", + "DATE_PUBLIC" : "2019-02-15T00:00:00", + "ID" : "CVE-2018-20241", + "STATE" : "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "Fisheye and Crucible", - "version": { - "version_data": [ + "product_name" : "Fisheye and Crucible", + "version" : { + "version_data" : [ { - "version_value": "4.7.0", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "4.7.0" } ] } } ] }, - "vendor_name": "Atlassian" + "vendor_name" : "Atlassian" } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "The Edit upload resource for a review in Atlassian Fisheye and Crucible before version 4.7.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the wbuser parameter." + "lang" : "eng", + "value" : "The Edit upload resource for a review in Atlassian Fisheye and Crucible before version 4.7.0 allows remote attackers to inject arbitrary HTML or JavaScript via a cross site scripting (XSS) vulnerability in the wbuser parameter." } ] }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "Cross Site Scripting (XSS)" + "lang" : "eng", + "value" : "Cross Site Scripting (XSS)" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { "name" : "https://jira.atlassian.com/browse/CRUC-8380", "refsource" : "CONFIRM", diff --git a/2019/1003xxx/CVE-2019-1003024.json b/2019/1003xxx/CVE-2019-1003024.json new file mode 100644 index 00000000000..12b9b615e66 --- /dev/null +++ b/2019/1003xxx/CVE-2019-1003024.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-1003024", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/1003xxx/CVE-2019-1003025.json b/2019/1003xxx/CVE-2019-1003025.json new file mode 100644 index 00000000000..a3e16569c99 --- /dev/null +++ b/2019/1003xxx/CVE-2019-1003025.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-1003025", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/1003xxx/CVE-2019-1003026.json b/2019/1003xxx/CVE-2019-1003026.json new file mode 100644 index 00000000000..e765de4338d --- /dev/null +++ b/2019/1003xxx/CVE-2019-1003026.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-1003026", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/1003xxx/CVE-2019-1003027.json b/2019/1003xxx/CVE-2019-1003027.json new file mode 100644 index 00000000000..e2975f3de6a --- /dev/null +++ b/2019/1003xxx/CVE-2019-1003027.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-1003027", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/1003xxx/CVE-2019-1003028.json b/2019/1003xxx/CVE-2019-1003028.json new file mode 100644 index 00000000000..be35d80247e --- /dev/null +++ b/2019/1003xxx/CVE-2019-1003028.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-1003028", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/8xxx/CVE-2019-8951.json b/2019/8xxx/CVE-2019-8951.json new file mode 100644 index 00000000000..843d712bf21 --- /dev/null +++ b/2019/8xxx/CVE-2019-8951.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-8951", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/8xxx/CVE-2019-8952.json b/2019/8xxx/CVE-2019-8952.json new file mode 100644 index 00000000000..50844c11dd9 --- /dev/null +++ b/2019/8xxx/CVE-2019-8952.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-8952", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}