From a664027162d9c99058a76df4fa06efba99e15e9b Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 24 Apr 2019 14:00:43 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/17xxx/CVE-2018-17057.json | 5 ++++ 2019/11xxx/CVE-2019-11499.json | 18 ++++++++++++ 2019/11xxx/CVE-2019-11500.json | 18 ++++++++++++ 2019/11xxx/CVE-2019-11501.json | 18 ++++++++++++ 2019/9xxx/CVE-2019-9724.json | 53 ++++++++++++++++++++++++++++++++-- 5 files changed, 110 insertions(+), 2 deletions(-) create mode 100644 2019/11xxx/CVE-2019-11499.json create mode 100644 2019/11xxx/CVE-2019-11500.json create mode 100644 2019/11xxx/CVE-2019-11501.json diff --git a/2018/17xxx/CVE-2018-17057.json b/2018/17xxx/CVE-2018-17057.json index 741e4f46c2c..11d73f33766 100644 --- a/2018/17xxx/CVE-2018-17057.json +++ b/2018/17xxx/CVE-2018-17057.json @@ -81,6 +81,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/152360/LimeSurvey-Deserialization-Remote-Code-Execution.html", "url": "http://packetstormsecurity.com/files/152360/LimeSurvey-Deserialization-Remote-Code-Execution.html" + }, + { + "refsource": "MISC", + "name": "https://contao.org/en/news/security-vulnerability-cve-2018-17057.html", + "url": "https://contao.org/en/news/security-vulnerability-cve-2018-17057.html" } ] } diff --git a/2019/11xxx/CVE-2019-11499.json b/2019/11xxx/CVE-2019-11499.json new file mode 100644 index 00000000000..866252d6739 --- /dev/null +++ b/2019/11xxx/CVE-2019-11499.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-11499", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/11xxx/CVE-2019-11500.json b/2019/11xxx/CVE-2019-11500.json new file mode 100644 index 00000000000..944a156fa05 --- /dev/null +++ b/2019/11xxx/CVE-2019-11500.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-11500", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/11xxx/CVE-2019-11501.json b/2019/11xxx/CVE-2019-11501.json new file mode 100644 index 00000000000..0c51a98353d --- /dev/null +++ b/2019/11xxx/CVE-2019-11501.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-11501", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9724.json b/2019/9xxx/CVE-2019-9724.json index d2fcfad4528..13d9b38dfea 100644 --- a/2019/9xxx/CVE-2019-9724.json +++ b/2019/9xxx/CVE-2019-9724.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-9724", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "aquaverde Aquarius CMS through 4.3.5 allows Information Exposure through Log Files because of an error in the Log-File writer component." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/aquaverde/aquarius-core/commit/d1dfa5b8280388a0b6f2f341f0681522dbea03b0", + "url": "https://github.com/aquaverde/aquarius-core/commit/d1dfa5b8280388a0b6f2f341f0681522dbea03b0" + }, + { + "refsource": "MISC", + "name": "https://www.tryption.ch/de/2019/04/19/information-disclosure-im-aquarius-cms/", + "url": "https://www.tryption.ch/de/2019/04/19/information-disclosure-im-aquarius-cms/" } ] }