diff --git a/2019/8xxx/CVE-2019-8263.json b/2019/8xxx/CVE-2019-8263.json index c57a26eaf1a..3f539e09eab 100644 --- a/2019/8xxx/CVE-2019-8263.json +++ b/2019/8xxx/CVE-2019-8263.json @@ -54,6 +54,13 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/", + "refsource" : "MISC", + "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/" + }, + { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-010-ultravnc-stack-based-buffer-overflow/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-010-ultravnc-stack-based-buffer-overflow/" } ] diff --git a/2019/8xxx/CVE-2019-8264.json b/2019/8xxx/CVE-2019-8264.json index b6d55fae349..156587fbf5d 100644 --- a/2019/8xxx/CVE-2019-8264.json +++ b/2019/8xxx/CVE-2019-8264.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-011-ultravnc-access-of-memory-location-after-end-of-buffer/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-011-ultravnc-access-of-memory-location-after-end-of-buffer/" } ] diff --git a/2019/8xxx/CVE-2019-8265.json b/2019/8xxx/CVE-2019-8265.json index aa13b08b68f..21ec03cf021 100644 --- a/2019/8xxx/CVE-2019-8265.json +++ b/2019/8xxx/CVE-2019-8265.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-012-ultravnc-access-of-memory-location-after-end-of-buffer/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-012-ultravnc-access-of-memory-location-after-end-of-buffer/" } ] diff --git a/2019/8xxx/CVE-2019-8266.json b/2019/8xxx/CVE-2019-8266.json index a73f450086b..b2c285d9364 100644 --- a/2019/8xxx/CVE-2019-8266.json +++ b/2019/8xxx/CVE-2019-8266.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-013-ultravnc-access-of-memory-location-after-end-of-buffer/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-013-ultravnc-access-of-memory-location-after-end-of-buffer/" } ] diff --git a/2019/8xxx/CVE-2019-8267.json b/2019/8xxx/CVE-2019-8267.json index b088467194f..379b82a7a5e 100644 --- a/2019/8xxx/CVE-2019-8267.json +++ b/2019/8xxx/CVE-2019-8267.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-014-ultravnc-out-of-bounds-read/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-014-ultravnc-out-of-bounds-read/" } ] diff --git a/2019/8xxx/CVE-2019-8268.json b/2019/8xxx/CVE-2019-8268.json index b0ea1c1d882..0020e649774 100644 --- a/2019/8xxx/CVE-2019-8268.json +++ b/2019/8xxx/CVE-2019-8268.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-015-ultravnc-off-by-one-error/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-015-ultravnc-off-by-one-error/" } ] diff --git a/2019/8xxx/CVE-2019-8269.json b/2019/8xxx/CVE-2019-8269.json index 54238660355..6708b3a7a6b 100644 --- a/2019/8xxx/CVE-2019-8269.json +++ b/2019/8xxx/CVE-2019-8269.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-016-ultravnc-stack-based-buffer-overflow/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-016-ultravnc-stack-based-buffer-overflow/" } ] diff --git a/2019/8xxx/CVE-2019-8270.json b/2019/8xxx/CVE-2019-8270.json index b0813674e5d..e93ca4fcd7f 100644 --- a/2019/8xxx/CVE-2019-8270.json +++ b/2019/8xxx/CVE-2019-8270.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-017-ultravnc-out-of-bounds-read/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-017-ultravnc-out-of-bounds-read/" } ] diff --git a/2019/8xxx/CVE-2019-8271.json b/2019/8xxx/CVE-2019-8271.json index 39ad73c2fd1..314e8de682f 100644 --- a/2019/8xxx/CVE-2019-8271.json +++ b/2019/8xxx/CVE-2019-8271.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-018-ultravnc-heap-based-buffer-overflow/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-018-ultravnc-heap-based-buffer-overflow/" } ] diff --git a/2019/8xxx/CVE-2019-8272.json b/2019/8xxx/CVE-2019-8272.json index b7f9a44d7a7..6afdf2f8da9 100644 --- a/2019/8xxx/CVE-2019-8272.json +++ b/2019/8xxx/CVE-2019-8272.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-019-ultravnc-off-by-one-error/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-019-ultravnc-off-by-one-error/" } ] diff --git a/2019/8xxx/CVE-2019-8273.json b/2019/8xxx/CVE-2019-8273.json index 4edc3a43428..956559ee7e0 100644 --- a/2019/8xxx/CVE-2019-8273.json +++ b/2019/8xxx/CVE-2019-8273.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-020-ultravnc-heap-based-buffer-overflow/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-020-ultravnc-heap-based-buffer-overflow/" } ] diff --git a/2019/8xxx/CVE-2019-8274.json b/2019/8xxx/CVE-2019-8274.json index a84f0e00756..62ef8ccc93b 100644 --- a/2019/8xxx/CVE-2019-8274.json +++ b/2019/8xxx/CVE-2019-8274.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-021-ultravnc-heap-based-buffer-overflow/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-021-ultravnc-heap-based-buffer-overflow/" } ] diff --git a/2019/8xxx/CVE-2019-8275.json b/2019/8xxx/CVE-2019-8275.json index 0b6f9229257..b9569f02cf1 100644 --- a/2019/8xxx/CVE-2019-8275.json +++ b/2019/8xxx/CVE-2019-8275.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-022-ultravnc-improper-null-termination/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-022-ultravnc-improper-null-termination/" } ] diff --git a/2019/8xxx/CVE-2019-8276.json b/2019/8xxx/CVE-2019-8276.json index 1832ef21b29..d11a5700a12 100644 --- a/2019/8xxx/CVE-2019-8276.json +++ b/2019/8xxx/CVE-2019-8276.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-023-ultravnc-stack-based-buffer-overflow/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-023-ultravnc-stack-based-buffer-overflow/" } ] diff --git a/2019/8xxx/CVE-2019-8277.json b/2019/8xxx/CVE-2019-8277.json index c4d391d5bb2..b03c45cdec6 100644 --- a/2019/8xxx/CVE-2019-8277.json +++ b/2019/8xxx/CVE-2019-8277.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-024-ultravnc-improper-initialization/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-024-ultravnc-improper-initialization/" } ] diff --git a/2019/8xxx/CVE-2019-8280.json b/2019/8xxx/CVE-2019-8280.json index 5c802bbd37e..a8d7c3dfcda 100644 --- a/2019/8xxx/CVE-2019-8280.json +++ b/2019/8xxx/CVE-2019-8280.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/", + "refsource" : "MISC", "url" : "https://ics-cert.kaspersky.com/advisories/klcert-advisories/2019/03/01/klcert-19-009-ultravnc-access-of-memory-location-after-end-of-buffer/" } ] diff --git a/2019/9xxx/CVE-2019-9637.json b/2019/9xxx/CVE-2019-9637.json new file mode 100644 index 00000000000..0fe9c4e7564 --- /dev/null +++ b/2019/9xxx/CVE-2019-9637.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9637", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. Due to the way rename() across filesystems is implemented, it is possible that file being renamed is briefly available with wrong permissions while the rename is ongoing, thus enabling unauthorized users to access the data." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugs.php.net/bug.php?id=77630", + "refsource" : "MISC", + "url" : "https://bugs.php.net/bug.php?id=77630" + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9638.json b/2019/9xxx/CVE-2019-9638.json new file mode 100644 index 00000000000..fcfbd79f150 --- /dev/null +++ b/2019/9xxx/CVE-2019-9638.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9638", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the maker_note->offset relationship to value_len." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugs.php.net/bug.php?id=77563", + "refsource" : "MISC", + "url" : "https://bugs.php.net/bug.php?id=77563" + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9639.json b/2019/9xxx/CVE-2019-9639.json new file mode 100644 index 00000000000..b3bc4588be4 --- /dev/null +++ b/2019/9xxx/CVE-2019-9639.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9639", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_MAKERNOTE because of mishandling the data_len variable." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugs.php.net/bug.php?id=77659", + "refsource" : "MISC", + "url" : "https://bugs.php.net/bug.php?id=77659" + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9640.json b/2019/9xxx/CVE-2019-9640.json new file mode 100644 index 00000000000..8487f1f190a --- /dev/null +++ b/2019/9xxx/CVE-2019-9640.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9640", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an Invalid Read in exif_process_SOFn." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugs.php.net/bug.php?id=77540", + "refsource" : "MISC", + "url" : "https://bugs.php.net/bug.php?id=77540" + } + ] + } +} diff --git a/2019/9xxx/CVE-2019-9641.json b/2019/9xxx/CVE-2019-9641.json new file mode 100644 index 00000000000..7d4f337c42d --- /dev/null +++ b/2019/9xxx/CVE-2019-9641.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-9641", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in the EXIF component in PHP before 7.1.27, 7.2.x before 7.2.16, and 7.3.x before 7.3.3. There is an uninitialized read in exif_process_IFD_in_TIFF." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugs.php.net/bug.php?id=77509", + "refsource" : "MISC", + "url" : "https://bugs.php.net/bug.php?id=77509" + } + ] + } +}