diff --git a/2014/125xxx/CVE-2014-125042.json b/2014/125xxx/CVE-2014-125042.json index c4191192862..ee04d9f3c06 100644 --- a/2014/125xxx/CVE-2014-125042.json +++ b/2014/125xxx/CVE-2014-125042.json @@ -1,105 +1,17 @@ { - "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", + "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2014-125042", - "ASSIGNER": "cna@vuldb.com", - "STATE": "PUBLIC" + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "A vulnerability classified as problematic was found in vicamo NetworkManager. Affected by this vulnerability is the function nm_setting_vlan_add_priority_str/nm_utils_rsa_key_encrypt/nm_setting_vlan_add_priority_str. The manipulation leads to missing release of resource. The name of the patch is afb0e2c53c4c17dfdb89d63b39db5101cc864704. It is recommended to apply a patch to fix this issue. The identifier VDB-217513 was assigned to this vulnerability." - }, - { - "lang": "deu", - "value": "In vicamo NetworkManager wurde eine problematische Schwachstelle entdeckt. Dabei geht es um die Funktion nm_setting_vlan_add_priority_str/nm_utils_rsa_key_encrypt/nm_setting_vlan_add_priority_str. Durch Beeinflussen mit unbekannten Daten kann eine missing release of resource-Schwachstelle ausgenutzt werden. Der Patch wird als afb0e2c53c4c17dfdb89d63b39db5101cc864704 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-772 Missing Release of Resource", - "cweId": "CWE-772" - } - ] - } - ] - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "vicamo", - "product": { - "product_data": [ - { - "product_name": "NetworkManager", - "version": { - "version_data": [ - { - "version_value": "n/a", - "version_affected": "=" - } - ] - } - } - ] - } - } - ] - } - }, - "references": { - "reference_data": [ - { - "url": "https://vuldb.com/?id.217513", - "refsource": "MISC", - "name": "https://vuldb.com/?id.217513" - }, - { - "url": "https://vuldb.com/?ctiid.217513", - "refsource": "MISC", - "name": "https://vuldb.com/?ctiid.217513" - }, - { - "url": "https://github.com/vicamo/NetworkManager/commit/afb0e2c53c4c17dfdb89d63b39db5101cc864704", - "refsource": "MISC", - "name": "https://github.com/vicamo/NetworkManager/commit/afb0e2c53c4c17dfdb89d63b39db5101cc864704" - } - ] - }, - "credits": [ - { - "lang": "en", - "value": "VulDB GitHub Commit Analyzer" - } - ], - "impact": { - "cvss": [ - { - "version": "3.1", - "baseScore": 3.5, - "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", - "baseSeverity": "LOW" - }, - { - "version": "3.0", - "baseScore": 3.5, - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", - "baseSeverity": "LOW" - }, - { - "version": "2.0", - "baseScore": 2.3, - "vectorString": "AV:A/AC:M/Au:S/C:N/I:N/A:P", - "baseSeverity": "LOW" + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2014/125xxx/CVE-2014-125043.json b/2014/125xxx/CVE-2014-125043.json index 2f36a7a53b2..66ccd0da861 100644 --- a/2014/125xxx/CVE-2014-125043.json +++ b/2014/125xxx/CVE-2014-125043.json @@ -1,105 +1,17 @@ { - "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", + "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2014-125043", - "ASSIGNER": "cna@vuldb.com", - "STATE": "PUBLIC" + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "A vulnerability, which was classified as problematic, has been found in vicamo NetworkManager. Affected by this issue is the function send_arps of the file src/devices/nm-device.c. The manipulation leads to unchecked return value. The name of the patch is 4da19b89815cbf6e063e39bc33c04fe4b3f789df. It is recommended to apply a patch to fix this issue. VDB-217514 is the identifier assigned to this vulnerability." - }, - { - "lang": "deu", - "value": "Eine problematische Schwachstelle wurde in vicamo NetworkManager entdeckt. Hierbei geht es um die Funktion send_arps der Datei src/devices/nm-device.c. Dank der Manipulation mit unbekannten Daten kann eine unchecked return value-Schwachstelle ausgenutzt werden. Der Patch wird als 4da19b89815cbf6e063e39bc33c04fe4b3f789df bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-252 Unchecked Return Value", - "cweId": "CWE-252" - } - ] - } - ] - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "vicamo", - "product": { - "product_data": [ - { - "product_name": "NetworkManager", - "version": { - "version_data": [ - { - "version_value": "n/a", - "version_affected": "=" - } - ] - } - } - ] - } - } - ] - } - }, - "references": { - "reference_data": [ - { - "url": "https://vuldb.com/?id.217514", - "refsource": "MISC", - "name": "https://vuldb.com/?id.217514" - }, - { - "url": "https://vuldb.com/?ctiid.217514", - "refsource": "MISC", - "name": "https://vuldb.com/?ctiid.217514" - }, - { - "url": "https://github.com/vicamo/NetworkManager/commit/4da19b89815cbf6e063e39bc33c04fe4b3f789df", - "refsource": "MISC", - "name": "https://github.com/vicamo/NetworkManager/commit/4da19b89815cbf6e063e39bc33c04fe4b3f789df" - } - ] - }, - "credits": [ - { - "lang": "en", - "value": "VulDB GitHub Commit Analyzer" - } - ], - "impact": { - "cvss": [ - { - "version": "3.1", - "baseScore": 5.5, - "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseSeverity": "MEDIUM" - }, - { - "version": "3.0", - "baseScore": 5.5, - "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", - "baseSeverity": "MEDIUM" - }, - { - "version": "2.0", - "baseScore": 4.9, - "vectorString": "AV:A/AC:M/Au:S/C:P/I:P/A:P", - "baseSeverity": "MEDIUM" + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2019/0xxx/CVE-2019-0087.json b/2019/0xxx/CVE-2019-0087.json index 21064817d8e..6f5eff096a8 100644 --- a/2019/0xxx/CVE-2019-0087.json +++ b/2019/0xxx/CVE-2019-0087.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0087", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-0087", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/0xxx/CVE-2019-0095.json b/2019/0xxx/CVE-2019-0095.json index 4bbeac35171..228c6ce2b88 100644 --- a/2019/0xxx/CVE-2019-0095.json +++ b/2019/0xxx/CVE-2019-0095.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0095", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-0095", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/0xxx/CVE-2019-0100.json b/2019/0xxx/CVE-2019-0100.json index 3d9e2acdd96..90727b685ad 100644 --- a/2019/0xxx/CVE-2019-0100.json +++ b/2019/0xxx/CVE-2019-0100.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0100", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-0100", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/0xxx/CVE-2019-0118.json b/2019/0xxx/CVE-2019-0118.json index c787009815d..3efb82baafd 100644 --- a/2019/0xxx/CVE-2019-0118.json +++ b/2019/0xxx/CVE-2019-0118.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0118", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-0118", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/0xxx/CVE-2019-0125.json b/2019/0xxx/CVE-2019-0125.json index 1c40d030a72..40963d8fe86 100644 --- a/2019/0xxx/CVE-2019-0125.json +++ b/2019/0xxx/CVE-2019-0125.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0125", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-0125", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/0xxx/CVE-2019-0133.json b/2019/0xxx/CVE-2019-0133.json index a229b1065b5..df212b9e6fb 100644 --- a/2019/0xxx/CVE-2019-0133.json +++ b/2019/0xxx/CVE-2019-0133.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0133", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-0133", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/0xxx/CVE-2019-0137.json b/2019/0xxx/CVE-2019-0137.json index 029b6da0faa..59fbdc255bf 100644 --- a/2019/0xxx/CVE-2019-0137.json +++ b/2019/0xxx/CVE-2019-0137.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0137", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-0137", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/0xxx/CVE-2019-0156.json b/2019/0xxx/CVE-2019-0156.json index d164e9022fe..4749dcc4360 100644 --- a/2019/0xxx/CVE-2019-0156.json +++ b/2019/0xxx/CVE-2019-0156.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0156", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-0156", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/0xxx/CVE-2019-0167.json b/2019/0xxx/CVE-2019-0167.json index b7cdcf2714a..c2e1107778e 100644 --- a/2019/0xxx/CVE-2019-0167.json +++ b/2019/0xxx/CVE-2019-0167.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0167", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-0167", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/0xxx/CVE-2019-0176.json b/2019/0xxx/CVE-2019-0176.json index 6719165428b..7ac24679ea9 100644 --- a/2019/0xxx/CVE-2019-0176.json +++ b/2019/0xxx/CVE-2019-0176.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2019-0176", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-0176", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11099.json b/2019/11xxx/CVE-2019-11099.json index 47e02cbf46b..642be06ab76 100644 --- a/2019/11xxx/CVE-2019-11099.json +++ b/2019/11xxx/CVE-2019-11099.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11099", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11115.json b/2019/11xxx/CVE-2019-11115.json index 2d634b7e350..c55f54128f0 100644 --- a/2019/11xxx/CVE-2019-11115.json +++ b/2019/11xxx/CVE-2019-11115.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11115", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11116.json b/2019/11xxx/CVE-2019-11116.json index 24034e94850..558a3d55fda 100644 --- a/2019/11xxx/CVE-2019-11116.json +++ b/2019/11xxx/CVE-2019-11116.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11116", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11118.json b/2019/11xxx/CVE-2019-11118.json index 223cf538b94..397746e76da 100644 --- a/2019/11xxx/CVE-2019-11118.json +++ b/2019/11xxx/CVE-2019-11118.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11118", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11122.json b/2019/11xxx/CVE-2019-11122.json index a9a723a27d8..2447285dd70 100644 --- a/2019/11xxx/CVE-2019-11122.json +++ b/2019/11xxx/CVE-2019-11122.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11122", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11130.json b/2019/11xxx/CVE-2019-11130.json index f8e7189fa35..b577b4f4459 100644 --- a/2019/11xxx/CVE-2019-11130.json +++ b/2019/11xxx/CVE-2019-11130.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11130", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11134.json b/2019/11xxx/CVE-2019-11134.json index ae3e2f68562..43e9d0ba203 100644 --- a/2019/11xxx/CVE-2019-11134.json +++ b/2019/11xxx/CVE-2019-11134.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11134", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11138.json b/2019/11xxx/CVE-2019-11138.json index 590cfa10f36..3ada248b881 100644 --- a/2019/11xxx/CVE-2019-11138.json +++ b/2019/11xxx/CVE-2019-11138.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11138", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11141.json b/2019/11xxx/CVE-2019-11141.json index 5b7437f97a9..949a438d051 100644 --- a/2019/11xxx/CVE-2019-11141.json +++ b/2019/11xxx/CVE-2019-11141.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11141", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11142.json b/2019/11xxx/CVE-2019-11142.json index b623b4c7bf1..da69ef418eb 100644 --- a/2019/11xxx/CVE-2019-11142.json +++ b/2019/11xxx/CVE-2019-11142.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11142", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11144.json b/2019/11xxx/CVE-2019-11144.json index 3e48f80a17b..dcfd17707dd 100644 --- a/2019/11xxx/CVE-2019-11144.json +++ b/2019/11xxx/CVE-2019-11144.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11144", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11149.json b/2019/11xxx/CVE-2019-11149.json index e9f22a852fc..6e97e6bbb88 100644 --- a/2019/11xxx/CVE-2019-11149.json +++ b/2019/11xxx/CVE-2019-11149.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11149", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11150.json b/2019/11xxx/CVE-2019-11150.json index 58c2fd5dbd7..b06084a6344 100644 --- a/2019/11xxx/CVE-2019-11150.json +++ b/2019/11xxx/CVE-2019-11150.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11150", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11158.json b/2019/11xxx/CVE-2019-11158.json index 4c860e896ff..076cb0fe4b4 100644 --- a/2019/11xxx/CVE-2019-11158.json +++ b/2019/11xxx/CVE-2019-11158.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11158", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11159.json b/2019/11xxx/CVE-2019-11159.json index 60d4dec16b0..90a5bd6c502 100644 --- a/2019/11xxx/CVE-2019-11159.json +++ b/2019/11xxx/CVE-2019-11159.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11159", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11160.json b/2019/11xxx/CVE-2019-11160.json index d4ce0b21763..3a2dfd5f2d6 100644 --- a/2019/11xxx/CVE-2019-11160.json +++ b/2019/11xxx/CVE-2019-11160.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11160", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11161.json b/2019/11xxx/CVE-2019-11161.json index 558eb6a4a0c..6f52e2f1650 100644 --- a/2019/11xxx/CVE-2019-11161.json +++ b/2019/11xxx/CVE-2019-11161.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11161", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11164.json b/2019/11xxx/CVE-2019-11164.json index 2cc5d1c53a0..2d0f1c19db5 100644 --- a/2019/11xxx/CVE-2019-11164.json +++ b/2019/11xxx/CVE-2019-11164.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11164", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11169.json b/2019/11xxx/CVE-2019-11169.json index 420c40464ef..9f5e6bf0265 100644 --- a/2019/11xxx/CVE-2019-11169.json +++ b/2019/11xxx/CVE-2019-11169.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11169", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11176.json b/2019/11xxx/CVE-2019-11176.json index 9f6a0e675bc..341950e45b4 100644 --- a/2019/11xxx/CVE-2019-11176.json +++ b/2019/11xxx/CVE-2019-11176.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11176", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/11xxx/CVE-2019-11183.json b/2019/11xxx/CVE-2019-11183.json index bae72d29c1e..b5c0e1b3338 100644 --- a/2019/11xxx/CVE-2019-11183.json +++ b/2019/11xxx/CVE-2019-11183.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2019-11183", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." } ] } diff --git a/2019/14xxx/CVE-2019-14552.json b/2019/14xxx/CVE-2019-14552.json new file mode 100644 index 00000000000..17ae2c32eee --- /dev/null +++ b/2019/14xxx/CVE-2019-14552.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14552", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14554.json b/2019/14xxx/CVE-2019-14554.json new file mode 100644 index 00000000000..8a3c1455b90 --- /dev/null +++ b/2019/14xxx/CVE-2019-14554.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14554", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14555.json b/2019/14xxx/CVE-2019-14555.json new file mode 100644 index 00000000000..3f41d8963c3 --- /dev/null +++ b/2019/14xxx/CVE-2019-14555.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14555", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14560.json b/2019/14xxx/CVE-2019-14560.json new file mode 100644 index 00000000000..549db41ea6d --- /dev/null +++ b/2019/14xxx/CVE-2019-14560.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14560", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14561.json b/2019/14xxx/CVE-2019-14561.json new file mode 100644 index 00000000000..90524103490 --- /dev/null +++ b/2019/14xxx/CVE-2019-14561.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14561", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14564.json b/2019/14xxx/CVE-2019-14564.json new file mode 100644 index 00000000000..c22de1e6214 --- /dev/null +++ b/2019/14xxx/CVE-2019-14564.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14564", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14567.json b/2019/14xxx/CVE-2019-14567.json new file mode 100644 index 00000000000..d7a66f3446a --- /dev/null +++ b/2019/14xxx/CVE-2019-14567.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14567", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14571.json b/2019/14xxx/CVE-2019-14571.json new file mode 100644 index 00000000000..970b20e1bdc --- /dev/null +++ b/2019/14xxx/CVE-2019-14571.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14571", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14572.json b/2019/14xxx/CVE-2019-14572.json new file mode 100644 index 00000000000..9ff65ea1b34 --- /dev/null +++ b/2019/14xxx/CVE-2019-14572.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14572", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14573.json b/2019/14xxx/CVE-2019-14573.json new file mode 100644 index 00000000000..d63875a43b0 --- /dev/null +++ b/2019/14xxx/CVE-2019-14573.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14573", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14576.json b/2019/14xxx/CVE-2019-14576.json new file mode 100644 index 00000000000..c53b2b5507c --- /dev/null +++ b/2019/14xxx/CVE-2019-14576.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14576", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14577.json b/2019/14xxx/CVE-2019-14577.json new file mode 100644 index 00000000000..f0ecc011656 --- /dev/null +++ b/2019/14xxx/CVE-2019-14577.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14577", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14578.json b/2019/14xxx/CVE-2019-14578.json new file mode 100644 index 00000000000..85321d1e57c --- /dev/null +++ b/2019/14xxx/CVE-2019-14578.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14578", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14579.json b/2019/14xxx/CVE-2019-14579.json new file mode 100644 index 00000000000..060802e98fa --- /dev/null +++ b/2019/14xxx/CVE-2019-14579.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14579", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14580.json b/2019/14xxx/CVE-2019-14580.json new file mode 100644 index 00000000000..6b07b59cfb9 --- /dev/null +++ b/2019/14xxx/CVE-2019-14580.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14580", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14581.json b/2019/14xxx/CVE-2019-14581.json new file mode 100644 index 00000000000..76f85a68a18 --- /dev/null +++ b/2019/14xxx/CVE-2019-14581.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14581", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14582.json b/2019/14xxx/CVE-2019-14582.json new file mode 100644 index 00000000000..fa4c6c088e3 --- /dev/null +++ b/2019/14xxx/CVE-2019-14582.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14582", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14583.json b/2019/14xxx/CVE-2019-14583.json new file mode 100644 index 00000000000..76d0bea9e3a --- /dev/null +++ b/2019/14xxx/CVE-2019-14583.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14583", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14585.json b/2019/14xxx/CVE-2019-14585.json new file mode 100644 index 00000000000..d1cb89a855f --- /dev/null +++ b/2019/14xxx/CVE-2019-14585.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14585", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14588.json b/2019/14xxx/CVE-2019-14588.json new file mode 100644 index 00000000000..7a2ea5fa271 --- /dev/null +++ b/2019/14xxx/CVE-2019-14588.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14588", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14589.json b/2019/14xxx/CVE-2019-14589.json new file mode 100644 index 00000000000..32f225e9ffc --- /dev/null +++ b/2019/14xxx/CVE-2019-14589.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14589", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14592.json b/2019/14xxx/CVE-2019-14592.json new file mode 100644 index 00000000000..1c4119400d8 --- /dev/null +++ b/2019/14xxx/CVE-2019-14592.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14592", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14593.json b/2019/14xxx/CVE-2019-14593.json new file mode 100644 index 00000000000..f36023d02c6 --- /dev/null +++ b/2019/14xxx/CVE-2019-14593.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14593", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14594.json b/2019/14xxx/CVE-2019-14594.json new file mode 100644 index 00000000000..f21041396ee --- /dev/null +++ b/2019/14xxx/CVE-2019-14594.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14594", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14595.json b/2019/14xxx/CVE-2019-14595.json new file mode 100644 index 00000000000..bbaf63ba345 --- /dev/null +++ b/2019/14xxx/CVE-2019-14595.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14595", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14597.json b/2019/14xxx/CVE-2019-14597.json new file mode 100644 index 00000000000..ad1a28ba659 --- /dev/null +++ b/2019/14xxx/CVE-2019-14597.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14597", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14606.json b/2019/14xxx/CVE-2019-14606.json new file mode 100644 index 00000000000..e5b1f707c8c --- /dev/null +++ b/2019/14xxx/CVE-2019-14606.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14606", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14614.json b/2019/14xxx/CVE-2019-14614.json new file mode 100644 index 00000000000..54a3257ef3b --- /dev/null +++ b/2019/14xxx/CVE-2019-14614.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14614", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14616.json b/2019/14xxx/CVE-2019-14616.json new file mode 100644 index 00000000000..49217906839 --- /dev/null +++ b/2019/14xxx/CVE-2019-14616.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14616", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14617.json b/2019/14xxx/CVE-2019-14617.json new file mode 100644 index 00000000000..3f239c58b06 --- /dev/null +++ b/2019/14xxx/CVE-2019-14617.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14617", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14618.json b/2019/14xxx/CVE-2019-14618.json new file mode 100644 index 00000000000..7148c4538a9 --- /dev/null +++ b/2019/14xxx/CVE-2019-14618.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14618", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14619.json b/2019/14xxx/CVE-2019-14619.json new file mode 100644 index 00000000000..00b07323da3 --- /dev/null +++ b/2019/14xxx/CVE-2019-14619.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14619", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14621.json b/2019/14xxx/CVE-2019-14621.json new file mode 100644 index 00000000000..1dfec949e23 --- /dev/null +++ b/2019/14xxx/CVE-2019-14621.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14621", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14622.json b/2019/14xxx/CVE-2019-14622.json new file mode 100644 index 00000000000..8acc9d23766 --- /dev/null +++ b/2019/14xxx/CVE-2019-14622.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14622", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14623.json b/2019/14xxx/CVE-2019-14623.json new file mode 100644 index 00000000000..cf1a1e6f962 --- /dev/null +++ b/2019/14xxx/CVE-2019-14623.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14623", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14624.json b/2019/14xxx/CVE-2019-14624.json new file mode 100644 index 00000000000..a11e9721044 --- /dev/null +++ b/2019/14xxx/CVE-2019-14624.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14624", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14627.json b/2019/14xxx/CVE-2019-14627.json new file mode 100644 index 00000000000..dfab402665e --- /dev/null +++ b/2019/14xxx/CVE-2019-14627.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14627", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14628.json b/2019/14xxx/CVE-2019-14628.json new file mode 100644 index 00000000000..6141f602447 --- /dev/null +++ b/2019/14xxx/CVE-2019-14628.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14628", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14631.json b/2019/14xxx/CVE-2019-14631.json new file mode 100644 index 00000000000..5400f9e14a9 --- /dev/null +++ b/2019/14xxx/CVE-2019-14631.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14631", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14632.json b/2019/14xxx/CVE-2019-14632.json new file mode 100644 index 00000000000..b0b5b2acd5c --- /dev/null +++ b/2019/14xxx/CVE-2019-14632.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14632", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14633.json b/2019/14xxx/CVE-2019-14633.json new file mode 100644 index 00000000000..1d2d849f1f4 --- /dev/null +++ b/2019/14xxx/CVE-2019-14633.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14633", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14634.json b/2019/14xxx/CVE-2019-14634.json new file mode 100644 index 00000000000..309880b82f3 --- /dev/null +++ b/2019/14xxx/CVE-2019-14634.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14634", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14635.json b/2019/14xxx/CVE-2019-14635.json new file mode 100644 index 00000000000..303920ad6f5 --- /dev/null +++ b/2019/14xxx/CVE-2019-14635.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14635", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14636.json b/2019/14xxx/CVE-2019-14636.json new file mode 100644 index 00000000000..c7245d4d7e4 --- /dev/null +++ b/2019/14xxx/CVE-2019-14636.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14636", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14637.json b/2019/14xxx/CVE-2019-14637.json new file mode 100644 index 00000000000..602730f2d55 --- /dev/null +++ b/2019/14xxx/CVE-2019-14637.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14637", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14638.json b/2019/14xxx/CVE-2019-14638.json new file mode 100644 index 00000000000..5658fd85c36 --- /dev/null +++ b/2019/14xxx/CVE-2019-14638.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14638", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14639.json b/2019/14xxx/CVE-2019-14639.json new file mode 100644 index 00000000000..8fb33af92f8 --- /dev/null +++ b/2019/14xxx/CVE-2019-14639.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14639", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14640.json b/2019/14xxx/CVE-2019-14640.json new file mode 100644 index 00000000000..05ea8246110 --- /dev/null +++ b/2019/14xxx/CVE-2019-14640.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14640", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14641.json b/2019/14xxx/CVE-2019-14641.json new file mode 100644 index 00000000000..bcd2b00d72b --- /dev/null +++ b/2019/14xxx/CVE-2019-14641.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14641", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14642.json b/2019/14xxx/CVE-2019-14642.json new file mode 100644 index 00000000000..891257e307e --- /dev/null +++ b/2019/14xxx/CVE-2019-14642.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14642", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14643.json b/2019/14xxx/CVE-2019-14643.json new file mode 100644 index 00000000000..85358a0df18 --- /dev/null +++ b/2019/14xxx/CVE-2019-14643.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14643", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14644.json b/2019/14xxx/CVE-2019-14644.json new file mode 100644 index 00000000000..32237368338 --- /dev/null +++ b/2019/14xxx/CVE-2019-14644.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14644", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14645.json b/2019/14xxx/CVE-2019-14645.json new file mode 100644 index 00000000000..d4de8b5ff43 --- /dev/null +++ b/2019/14xxx/CVE-2019-14645.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14645", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14646.json b/2019/14xxx/CVE-2019-14646.json new file mode 100644 index 00000000000..b5c5b90370d --- /dev/null +++ b/2019/14xxx/CVE-2019-14646.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14646", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14647.json b/2019/14xxx/CVE-2019-14647.json new file mode 100644 index 00000000000..5239695d8f2 --- /dev/null +++ b/2019/14xxx/CVE-2019-14647.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14647", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14648.json b/2019/14xxx/CVE-2019-14648.json new file mode 100644 index 00000000000..7256e3c8acc --- /dev/null +++ b/2019/14xxx/CVE-2019-14648.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14648", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14649.json b/2019/14xxx/CVE-2019-14649.json new file mode 100644 index 00000000000..e4838ea91dc --- /dev/null +++ b/2019/14xxx/CVE-2019-14649.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14649", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14650.json b/2019/14xxx/CVE-2019-14650.json new file mode 100644 index 00000000000..c9231dd83ae --- /dev/null +++ b/2019/14xxx/CVE-2019-14650.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14650", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14651.json b/2019/14xxx/CVE-2019-14651.json new file mode 100644 index 00000000000..10d153d4125 --- /dev/null +++ b/2019/14xxx/CVE-2019-14651.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-14651", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2019. Notes: none." + } + ] + } +} \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37916.json b/2022/37xxx/CVE-2022-37916.json index b9b6db1aecc..9cc0d9eb35f 100644 --- a/2022/37xxx/CVE-2022-37916.json +++ b/2022/37xxx/CVE-2022-37916.json @@ -1,34 +1,19 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-37916", "ASSIGNER": "security-alert@hpe.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "n/a", - "product": { - "product_data": [ - { - "product_name": "Aruba AirWave Management Platform", - "version": { - "version_data": [ - { - "version_value": "8.2.15.0 and below" - } - ] - } - } - ] - } - } - ] - } + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below." + } + ] }, "problemtype": { "problemtype_data": [ @@ -42,21 +27,49 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Aruba AirWave Management Platform", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "8.2.15.0 and below" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-019.txt", "refsource": "MISC", - "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-019.txt", - "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-019.txt" + "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-019.txt" } ] }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below." - } - ] - } + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Colton Bachman of Aruba Threat Labs" + } + ] } \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37917.json b/2022/37xxx/CVE-2022-37917.json index 778b0753ee1..04c80c4747d 100644 --- a/2022/37xxx/CVE-2022-37917.json +++ b/2022/37xxx/CVE-2022-37917.json @@ -1,34 +1,19 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-37917", "ASSIGNER": "security-alert@hpe.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "n/a", - "product": { - "product_data": [ - { - "product_name": "Aruba AirWave Management Platform", - "version": { - "version_data": [ - { - "version_value": "8.2.15.0 and below" - } - ] - } - } - ] - } - } - ] - } + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below." + } + ] }, "problemtype": { "problemtype_data": [ @@ -42,21 +27,49 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Aruba AirWave Management Platform", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "8.2.15.0 and below" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-019.txt", "refsource": "MISC", - "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-019.txt", - "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-019.txt" + "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-019.txt" } ] }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below." - } - ] - } + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": "Colton Bachman of Aruba Threat Labs" + } + ] } \ No newline at end of file diff --git a/2022/37xxx/CVE-2022-37918.json b/2022/37xxx/CVE-2022-37918.json index 9dfa8301964..d34548234b4 100644 --- a/2022/37xxx/CVE-2022-37918.json +++ b/2022/37xxx/CVE-2022-37918.json @@ -1,34 +1,19 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2022-37918", "ASSIGNER": "security-alert@hpe.com", "STATE": "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "n/a", - "product": { - "product_data": [ - { - "product_name": "Aruba AirWave Management Platform", - "version": { - "version_data": [ - { - "version_value": "8.2.15.0 and below" - } - ] - } - } - ] - } - } - ] - } + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below." + } + ] }, "problemtype": { "problemtype_data": [ @@ -42,21 +27,49 @@ } ] }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "n/a", + "product": { + "product_data": [ + { + "product_name": "Aruba AirWave Management Platform", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "8.2.15.0 and below" + } + ] + } + } + ] + } + } + ] + } + }, "references": { "reference_data": [ { + "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-019.txt", "refsource": "MISC", - "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-019.txt", - "url": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-019.txt" + "name": "https://www.arubanetworks.com/assets/alert/ARUBA-PSA-2022-019.txt" } ] }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Vulnerabilities in the AirWave Management Platform web-based management interface exist which expose some URLs to a lack of proper access controls. These vulnerabilities could allow a remote attacker with limited privileges to gain access to sensitive information and/or change network configurations with privileges at a higher effective level in Aruba AirWave Management Platform version(s): 8.2.15.0 and below." - } - ] - } + "generator": { + "engine": "Vulnogram 0.1.0-dev" + }, + "source": { + "discovery": "UNKNOWN" + }, + "credits": [ + { + "lang": "en", + "value": " oussama sadouki" + } + ] } \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1017.json b/2023/1xxx/CVE-2023-1017.json index ed2cc9d5300..f556959b98c 100644 --- a/2023/1xxx/CVE-2023-1017.json +++ b/2023/1xxx/CVE-2023-1017.json @@ -1,18 +1,90 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-1017", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "cert@cert.org", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An out-of-bounds write vulnerability exists in TPM2.0's Module Library allowing writing of a 2-byte data past the end of TPM2.0 command in the CryptParameterDecryption routine. An attacker who can successfully exploit this vulnerability can lead to denial of service (crashing the TPM chip/process or rendering it unusable) and/or arbitrary code execution in the TPM context." } ] - } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-787 Out-of-bounds Write" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Trusted Computing Group", + "product": { + "product_data": [ + { + "product_name": "TPM2.0", + "version": { + "version_data": [ + { + "version_affected": "=", + "version_value": "1.59" + }, + { + "version_affected": "=", + "version_value": "1.38" + }, + { + "version_affected": "=", + "version_value": "1.19" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://trustedcomputinggroup.org/resource/errata-for-tpm-library-specification-2-0/", + "refsource": "MISC", + "name": "https://trustedcomputinggroup.org/resource/errata-for-tpm-library-specification-2-0/" + }, + { + "url": "https://kb.cert.org/vuls/id/782720", + "refsource": "MISC", + "name": "https://kb.cert.org/vuls/id/782720" + } + ] + }, + "generator": { + "engine": "VINCE 2.0.6", + "env": "prod", + "origin": "https://cveawg.mitre.org/api/cve/CVE-2023-1017" + }, + "source": { + "discovery": "external" + }, + "credits": [ + { + "lang": "en", + "value": "Francisco Falcon of Quarkslab" + } + ] } \ No newline at end of file diff --git a/2023/1xxx/CVE-2023-1065.json b/2023/1xxx/CVE-2023-1065.json index 328d8749607..44102df1b75 100644 --- a/2023/1xxx/CVE-2023-1065.json +++ b/2023/1xxx/CVE-2023-1065.json @@ -1,17 +1,88 @@ { + "data_version": "4.0", "data_type": "CVE", "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2023-1065", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "report@snyk.io", + "STATE": "PUBLIC" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "This vulnerability in the Snyk Kubernetes Monitor can result in irrelevant data being posted to a Snyk Organization, which could in turn obfuscate other, relevant, security issues. It does not expose the user of the integration to any direct security risk and no user data can be leaked. To exploit the vulnerability the attacker does not need to be authenticated to Snyk but does need to know the target's Integration ID (which may or may not be the same as the Organization ID, although this is an unpredictable UUID in either case)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-287 Improper Authentication", + "cweId": "CWE-287" + } + ] + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Snyk", + "product": { + "product_data": [ + { + "product_name": "Snyk Kubernetes Monitor", + "version": { + "version_data": [ + { + "version_affected": "<", + "version_name": "2.0.0", + "version_value": "*" + } + ] + } + } + ] + } + } + ] + } + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/snyk/kubernetes-monitor/pull/1275", + "refsource": "MISC", + "name": "https://github.com/snyk/kubernetes-monitor/pull/1275" + } + ] + }, + "credits": [ + { + "lang": "en", + "value": "Tesco CyberSecurity Team" + } + ], + "impact": { + "cvss": [ + { + "attackVector": "NETWORK", + "attackComplexity": "LOW", + "privilegesRequired": "NONE", + "userInteraction": "NONE", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "LOW", + "availabilityImpact": "LOW", + "baseScore": 6.5, + "baseSeverity": "MEDIUM", + "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "version": "3.1" } ] } diff --git a/2023/1xxx/CVE-2023-1098.json b/2023/1xxx/CVE-2023-1098.json new file mode 100644 index 00000000000..f47aaf48e0e --- /dev/null +++ b/2023/1xxx/CVE-2023-1098.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2023-1098", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file