From 9d42eb35f60746fc465d82aef49d6b478a3695e0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 3 Apr 2019 19:00:49 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2015/5xxx/CVE-2015-5606.json | 48 ++++++++++++++++++++++++++++++++-- 2016/3xxx/CVE-2016-3714.json | 5 ++++ 2019/10xxx/CVE-2019-10726.json | 18 +++++++++++++ 2019/10xxx/CVE-2019-10727.json | 18 +++++++++++++ 2019/10xxx/CVE-2019-10728.json | 18 +++++++++++++ 2019/10xxx/CVE-2019-10729.json | 18 +++++++++++++ 2019/10xxx/CVE-2019-10730.json | 18 +++++++++++++ 2019/10xxx/CVE-2019-10731.json | 18 +++++++++++++ 2019/10xxx/CVE-2019-10732.json | 18 +++++++++++++ 2019/10xxx/CVE-2019-10733.json | 18 +++++++++++++ 2019/10xxx/CVE-2019-10734.json | 18 +++++++++++++ 2019/10xxx/CVE-2019-10735.json | 18 +++++++++++++ 2019/10xxx/CVE-2019-10736.json | 18 +++++++++++++ 2019/10xxx/CVE-2019-10737.json | 18 +++++++++++++ 2019/10xxx/CVE-2019-10738.json | 18 +++++++++++++ 2019/10xxx/CVE-2019-10739.json | 18 +++++++++++++ 2019/10xxx/CVE-2019-10740.json | 18 +++++++++++++ 2019/10xxx/CVE-2019-10741.json | 18 +++++++++++++ 2019/3xxx/CVE-2019-3835.json | 5 ++++ 2019/3xxx/CVE-2019-3838.json | 5 ++++ 2019/6xxx/CVE-2019-6116.json | 5 ++++ 21 files changed, 354 insertions(+), 2 deletions(-) create mode 100644 2019/10xxx/CVE-2019-10726.json create mode 100644 2019/10xxx/CVE-2019-10727.json create mode 100644 2019/10xxx/CVE-2019-10728.json create mode 100644 2019/10xxx/CVE-2019-10729.json create mode 100644 2019/10xxx/CVE-2019-10730.json create mode 100644 2019/10xxx/CVE-2019-10731.json create mode 100644 2019/10xxx/CVE-2019-10732.json create mode 100644 2019/10xxx/CVE-2019-10733.json create mode 100644 2019/10xxx/CVE-2019-10734.json create mode 100644 2019/10xxx/CVE-2019-10735.json create mode 100644 2019/10xxx/CVE-2019-10736.json create mode 100644 2019/10xxx/CVE-2019-10737.json create mode 100644 2019/10xxx/CVE-2019-10738.json create mode 100644 2019/10xxx/CVE-2019-10739.json create mode 100644 2019/10xxx/CVE-2019-10740.json create mode 100644 2019/10xxx/CVE-2019-10741.json diff --git a/2015/5xxx/CVE-2015-5606.json b/2015/5xxx/CVE-2015-5606.json index b32cd346c0c..7c391c90503 100644 --- a/2015/5xxx/CVE-2015-5606.json +++ b/2015/5xxx/CVE-2015-5606.json @@ -2,7 +2,7 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2015-5606", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +11,51 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Vordel XML Gateway (acquired by Axway) version 7.2.2 could allow remote attackers to cause a denial of service via a specially crafted request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://www.excellium-services.com/cert-xlm-advisory/cve-2015-5606/", + "url": "https://www.excellium-services.com/cert-xlm-advisory/cve-2015-5606/" } ] } diff --git a/2016/3xxx/CVE-2016-3714.json b/2016/3xxx/CVE-2016-3714.json index fa32fedc434..e67d0e323f4 100644 --- a/2016/3xxx/CVE-2016-3714.json +++ b/2016/3xxx/CVE-2016-3714.json @@ -196,6 +196,11 @@ "name": "VU#250519", "refsource": "CERT-VN", "url": "https://www.kb.cert.org/vuls/id/250519" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152364/ImageTragick-ImageMagick-Proof-Of-Concepts.html", + "url": "http://packetstormsecurity.com/files/152364/ImageTragick-ImageMagick-Proof-Of-Concepts.html" } ] } diff --git a/2019/10xxx/CVE-2019-10726.json b/2019/10xxx/CVE-2019-10726.json new file mode 100644 index 00000000000..df71410ade0 --- /dev/null +++ b/2019/10xxx/CVE-2019-10726.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10726", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10727.json b/2019/10xxx/CVE-2019-10727.json new file mode 100644 index 00000000000..2946c37ae93 --- /dev/null +++ b/2019/10xxx/CVE-2019-10727.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10727", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10728.json b/2019/10xxx/CVE-2019-10728.json new file mode 100644 index 00000000000..200ae648c40 --- /dev/null +++ b/2019/10xxx/CVE-2019-10728.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10728", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10729.json b/2019/10xxx/CVE-2019-10729.json new file mode 100644 index 00000000000..42fec157217 --- /dev/null +++ b/2019/10xxx/CVE-2019-10729.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10729", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10730.json b/2019/10xxx/CVE-2019-10730.json new file mode 100644 index 00000000000..599b705a4ee --- /dev/null +++ b/2019/10xxx/CVE-2019-10730.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10730", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10731.json b/2019/10xxx/CVE-2019-10731.json new file mode 100644 index 00000000000..0adc700e245 --- /dev/null +++ b/2019/10xxx/CVE-2019-10731.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10731", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10732.json b/2019/10xxx/CVE-2019-10732.json new file mode 100644 index 00000000000..77dea27f1b2 --- /dev/null +++ b/2019/10xxx/CVE-2019-10732.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10732", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10733.json b/2019/10xxx/CVE-2019-10733.json new file mode 100644 index 00000000000..736099c005f --- /dev/null +++ b/2019/10xxx/CVE-2019-10733.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10733", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10734.json b/2019/10xxx/CVE-2019-10734.json new file mode 100644 index 00000000000..232cb64b44e --- /dev/null +++ b/2019/10xxx/CVE-2019-10734.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10734", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10735.json b/2019/10xxx/CVE-2019-10735.json new file mode 100644 index 00000000000..83131c612e6 --- /dev/null +++ b/2019/10xxx/CVE-2019-10735.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10735", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10736.json b/2019/10xxx/CVE-2019-10736.json new file mode 100644 index 00000000000..e015fad4cdf --- /dev/null +++ b/2019/10xxx/CVE-2019-10736.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10736", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10737.json b/2019/10xxx/CVE-2019-10737.json new file mode 100644 index 00000000000..f62f7d6d76d --- /dev/null +++ b/2019/10xxx/CVE-2019-10737.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10737", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10738.json b/2019/10xxx/CVE-2019-10738.json new file mode 100644 index 00000000000..0ff5b6a834a --- /dev/null +++ b/2019/10xxx/CVE-2019-10738.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10738", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10739.json b/2019/10xxx/CVE-2019-10739.json new file mode 100644 index 00000000000..07abef975d7 --- /dev/null +++ b/2019/10xxx/CVE-2019-10739.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10739", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10740.json b/2019/10xxx/CVE-2019-10740.json new file mode 100644 index 00000000000..69f88bf2532 --- /dev/null +++ b/2019/10xxx/CVE-2019-10740.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10740", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10741.json b/2019/10xxx/CVE-2019-10741.json new file mode 100644 index 00000000000..00a654f2ae4 --- /dev/null +++ b/2019/10xxx/CVE-2019-10741.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-10741", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/3xxx/CVE-2019-3835.json b/2019/3xxx/CVE-2019-3835.json index c682f9a700b..37af6fbfc5f 100644 --- a/2019/3xxx/CVE-2019-3835.json +++ b/2019/3xxx/CVE-2019-3835.json @@ -73,6 +73,11 @@ "refsource": "BUGTRAQ", "name": "20190402 [slackware-security] ghostscript (SSA:2019-092-01)", "url": "https://seclists.org/bugtraq/2019/Apr/4" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html", + "url": "http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html" } ] }, diff --git a/2019/3xxx/CVE-2019-3838.json b/2019/3xxx/CVE-2019-3838.json index a0e599316cc..5012496c471 100644 --- a/2019/3xxx/CVE-2019-3838.json +++ b/2019/3xxx/CVE-2019-3838.json @@ -83,6 +83,11 @@ "refsource": "BUGTRAQ", "name": "20190402 [slackware-security] ghostscript (SSA:2019-092-01)", "url": "https://seclists.org/bugtraq/2019/Apr/4" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html", + "url": "http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html" } ] }, diff --git a/2019/6xxx/CVE-2019-6116.json b/2019/6xxx/CVE-2019-6116.json index c2dd934da11..a35f47649e2 100644 --- a/2019/6xxx/CVE-2019-6116.json +++ b/2019/6xxx/CVE-2019-6116.json @@ -136,6 +136,11 @@ "refsource": "BUGTRAQ", "name": "20190402 [slackware-security] ghostscript (SSA:2019-092-01)", "url": "https://seclists.org/bugtraq/2019/Apr/4" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html", + "url": "http://packetstormsecurity.com/files/152367/Slackware-Security-Advisory-ghostscript-Updates.html" } ] }