diff --git a/2017/12xxx/CVE-2017-12884.json b/2017/12xxx/CVE-2017-12884.json index b07aa77cc14..3b8d12f6434 100644 --- a/2017/12xxx/CVE-2017-12884.json +++ b/2017/12xxx/CVE-2017-12884.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-12884", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,38 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "OX Software GmbH App Suite 7.8.4 and earlier is affected by: Information Exposure." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://ox.com", + "refsource": "MISC", + "name": "http://ox.com" + }, + { + "url": "http://app.com", + "refsource": "MISC", + "name": "http://app.com" + }, + { + "refsource": "CONFIRM", + "name": "https://documentation.open-xchange.com/7.8.3/release-notes/release-notes.html", + "url": "https://documentation.open-xchange.com/7.8.3/release-notes/release-notes.html" } ] } diff --git a/2018/14xxx/CVE-2018-14773.json b/2018/14xxx/CVE-2018-14773.json index e988aa9bcd9..80ce2436d42 100644 --- a/2018/14xxx/CVE-2018-14773.json +++ b/2018/14xxx/CVE-2018-14773.json @@ -86,6 +86,11 @@ "refsource": "DEBIAN", "name": "DSA-4441", "url": "https://www.debian.org/security/2019/dsa-4441" + }, + { + "refsource": "BUGTRAQ", + "name": "20190510 [SECURITY] [DSA 4441-1] symfony security update", + "url": "https://seclists.org/bugtraq/2019/May/21" } ] } diff --git a/2018/19xxx/CVE-2018-19789.json b/2018/19xxx/CVE-2018-19789.json index d05726ff920..33bd34e6882 100644 --- a/2018/19xxx/CVE-2018-19789.json +++ b/2018/19xxx/CVE-2018-19789.json @@ -86,6 +86,11 @@ "refsource": "DEBIAN", "name": "DSA-4441", "url": "https://www.debian.org/security/2019/dsa-4441" + }, + { + "refsource": "BUGTRAQ", + "name": "20190510 [SECURITY] [DSA 4441-1] symfony security update", + "url": "https://seclists.org/bugtraq/2019/May/21" } ] } diff --git a/2018/19xxx/CVE-2018-19790.json b/2018/19xxx/CVE-2018-19790.json index 1ce56b26a64..1a6d21a19b3 100644 --- a/2018/19xxx/CVE-2018-19790.json +++ b/2018/19xxx/CVE-2018-19790.json @@ -86,6 +86,11 @@ "refsource": "DEBIAN", "name": "DSA-4441", "url": "https://www.debian.org/security/2019/dsa-4441" + }, + { + "refsource": "BUGTRAQ", + "name": "20190510 [SECURITY] [DSA 4441-1] symfony security update", + "url": "https://seclists.org/bugtraq/2019/May/21" } ] } diff --git a/2019/11xxx/CVE-2019-11082.json b/2019/11xxx/CVE-2019-11082.json index 288ddaf6d82..31de1ce840a 100644 --- a/2019/11xxx/CVE-2019-11082.json +++ b/2019/11xxx/CVE-2019-11082.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-11082", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-11082", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "core/api/datasets/internal/actions/Explode.java in the Dataset API in DKPro Core through 1.10.0 allows Directory Traversal, resulting in the overwrite of local files with the contents of an archive." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/dkpro/dkpro-core/issues/1325", + "refsource": "MISC", + "name": "https://github.com/dkpro/dkpro-core/issues/1325" } ] } diff --git a/2019/11xxx/CVE-2019-11879.json b/2019/11xxx/CVE-2019-11879.json new file mode 100644 index 00000000000..e73abef579d --- /dev/null +++ b/2019/11xxx/CVE-2019-11879.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-11879", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** DISPUTED ** The WEBrick gem 1.4.2 for Ruby allows directory traversal if the attacker once had local access to create a symlink to a location outside of the web root directory. NOTE: The vendor states that this is analogous to Options FollowSymlinks in the Apache HTTP Server, and therefore it is \"not a problem.\"" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugs.ruby-lang.org/issues/15835", + "refsource": "MISC", + "name": "https://bugs.ruby-lang.org/issues/15835" + } + ] + } +} \ No newline at end of file