From 17c2cbc9980518f13e1f44b50f09b5157bf26766 Mon Sep 17 00:00:00 2001 From: santosomar Date: Wed, 9 Jan 2019 18:26:39 +0000 Subject: [PATCH 01/10] Adding Cisco CVE-2018-15440 --- 2018/15xxx/CVE-2018-15440.json | 101 +++++++++++++++++++++++++++------ 1 file changed, 85 insertions(+), 16 deletions(-) diff --git a/2018/15xxx/CVE-2018-15440.json b/2018/15xxx/CVE-2018-15440.json index ebed2207014..a187409da29 100644 --- a/2018/15xxx/CVE-2018-15440.json +++ b/2018/15xxx/CVE-2018-15440.json @@ -1,18 +1,87 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2018-15440", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } + "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2019-01-09T16:00:00-0800", + "ID": "CVE-2018-15440", + "STATE": "PUBLIC", + "TITLE": "Cisco Identity Services Engine Multiple Cross-Site Scripting Vulnerabilities" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Identity Services Engine Software ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack or a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. For more information about these vulnerabilities, see the Details section of this security advisory. " + } + ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "6.1", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20190109 Cisco Identity Services Engine Multiple Cross-Site Scripting Vulnerabilities", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-ise-multi-xss" + } + ] + }, + "source": { + "advisory": "cisco-sa-20190109-ise-multi-xss", + "defect": [ + [ + "CSCvm71860", + "CSCvm79609" + ] + ], + "discovery": "INTERNAL" + } } From 6a6fe3add15125dbe51d93e06ace42378f05077f Mon Sep 17 00:00:00 2001 From: santosomar Date: Wed, 9 Jan 2019 19:16:12 +0000 Subject: [PATCH 02/10] Adding Cisco CVE-2018-15463 --- 2018/15xxx/CVE-2018-15463.json | 101 +++++++++++++++++++++++++++------ 1 file changed, 85 insertions(+), 16 deletions(-) diff --git a/2018/15xxx/CVE-2018-15463.json b/2018/15xxx/CVE-2018-15463.json index cbc30dc3c99..0d81a476c55 100644 --- a/2018/15xxx/CVE-2018-15463.json +++ b/2018/15xxx/CVE-2018-15463.json @@ -1,18 +1,87 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2018-15463", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } - ] - } + "CVE_data_meta": { + "ASSIGNER": "psirt@cisco.com", + "DATE_PUBLIC": "2019-01-09T16:00:00-0800", + "ID": "CVE-2018-15463", + "STATE": "PUBLIC", + "TITLE": "Cisco Identity Services Engine Multiple Cross-Site Scripting Vulnerabilities" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Cisco Identity Services Engine Software ", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "Cisco" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack or a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. For more information about these vulnerabilities, see the Details section of this security advisory. " + } + ] + }, + "exploit": [ + { + "lang": "eng", + "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " + } + ], + "impact": { + "cvss": { + "baseScore": "6.1", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N ", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-79" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "20190109 Cisco Identity Services Engine Multiple Cross-Site Scripting Vulnerabilities", + "refsource": "CISCO", + "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-ise-multi-xss" + } + ] + }, + "source": { + "advisory": "cisco-sa-20190109-ise-multi-xss", + "defect": [ + [ + "CSCvm71860", + "CSCvm79609" + ] + ], + "discovery": "INTERNAL" + } } From d9f5e951b7aa4ac78862acb72843359154431fd6 Mon Sep 17 00:00:00 2001 From: Omar Santos Date: Sat, 12 Jan 2019 23:59:14 -0500 Subject: [PATCH 03/10] Update CVE-2018-15463.json --- 2018/15xxx/CVE-2018-15463.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2018/15xxx/CVE-2018-15463.json b/2018/15xxx/CVE-2018-15463.json index 0d81a476c55..6b512eaa960 100644 --- a/2018/15xxx/CVE-2018-15463.json +++ b/2018/15xxx/CVE-2018-15463.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack or a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. For more information about these vulnerabilities, see the Details section of this security advisory. " + "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient sanitization of user-supplied data that is written to log files and displayed in certain web pages of the web-based management interface of an affected device. An attacker could exploit this vulnerability by convincing a user of the interface to click a specific link or view an affected log file. The injected script code may be executed in the context of the web-based management interface or allow the attacker to access sensitive browser-based information. " } ] }, From 9165a41aa6c59e196857346177e675837f035abc Mon Sep 17 00:00:00 2001 From: Omar Santos Date: Sun, 13 Jan 2019 00:01:09 -0500 Subject: [PATCH 04/10] Update CVE-2018-15440.json --- 2018/15xxx/CVE-2018-15440.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2018/15xxx/CVE-2018-15440.json b/2018/15xxx/CVE-2018-15440.json index a187409da29..cab61b06c7f 100644 --- a/2018/15xxx/CVE-2018-15440.json +++ b/2018/15xxx/CVE-2018-15440.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "Multiple vulnerabilities in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack or a reflected cross-site scripting (XSS) attack against a user of the web-based management interface of an affected device. For more information about these vulnerabilities, see the Details section of this security advisory. " + "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient input validation of some parameters passed to the web-based management interface of an affected device. An attacker could exploit this vulnerability by convincing a user of the interface to click a specific link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based management interface or allow the attacker to access sensitive browser-based information." } ] }, From 1964a0b8d3510937c6cd7a7be19d4336b205fea3 Mon Sep 17 00:00:00 2001 From: Omar Santos Date: Mon, 14 Jan 2019 19:07:24 -0500 Subject: [PATCH 05/10] Update CVE-2018-15463.json --- 2018/15xxx/CVE-2018-15463.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2018/15xxx/CVE-2018-15463.json b/2018/15xxx/CVE-2018-15463.json index 6b512eaa960..31947bddf18 100644 --- a/2018/15xxx/CVE-2018-15463.json +++ b/2018/15xxx/CVE-2018-15463.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient sanitization of user-supplied data that is written to log files and displayed in certain web pages of the web-based management interface of an affected device. An attacker could exploit this vulnerability by convincing a user of the interface to click a specific link or view an affected log file. The injected script code may be executed in the context of the web-based management interface or allow the attacker to access sensitive browser-based information. " + "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient input validation of some parameters passed to the web-based management interface of an affected device. An attacker could exploit this vulnerability by convincing a user of the interface to click a specific link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based management interface or allow the attacker to access sensitive browser-based information." } ] }, From b7f950b58f5ace8a9ff2be30c82fe162c47a9c76 Mon Sep 17 00:00:00 2001 From: Omar Santos Date: Mon, 14 Jan 2019 19:07:37 -0500 Subject: [PATCH 06/10] Update CVE-2018-15440.json --- 2018/15xxx/CVE-2018-15440.json | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/2018/15xxx/CVE-2018-15440.json b/2018/15xxx/CVE-2018-15440.json index cab61b06c7f..b4efdc63b98 100644 --- a/2018/15xxx/CVE-2018-15440.json +++ b/2018/15xxx/CVE-2018-15440.json @@ -36,7 +36,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient input validation of some parameters passed to the web-based management interface of an affected device. An attacker could exploit this vulnerability by convincing a user of the interface to click a specific link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based management interface or allow the attacker to access sensitive browser-based information." + "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient sanitization of user-supplied data that is written to log files and displayed in certain web pages of the web-based management interface of an affected device. An attacker could exploit this vulnerability by convincing a user of the interface to click a specific link or view an affected log file. The injected script code may be executed in the context of the web-based management interface or allow the attacker to access sensitive browser-based information." } ] }, From 83cd59200fd6d6724013ea89560a6efa6b52a5d6 Mon Sep 17 00:00:00 2001 From: Scott Moore - IBM Date: Tue, 15 Jan 2019 12:23:41 -0500 Subject: [PATCH 07/10] IBM20190115-122341 Added CVE-2018-1772 --- 2018/1xxx/CVE-2018-1772.json | 92 ++++++++++++++++++++++++++++++++---- 1 file changed, 82 insertions(+), 10 deletions(-) diff --git a/2018/1xxx/CVE-2018-1772.json b/2018/1xxx/CVE-2018-1772.json index 812225de1e3..940bb2f4d55 100644 --- a/2018/1xxx/CVE-2018-1772.json +++ b/2018/1xxx/CVE-2018-1772.json @@ -1,18 +1,90 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2018-1772", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", "description" : { "description_data" : [ { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "IBM SPSS Analytic Server 3.1.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 148689.", + "lang" : "eng" } ] + }, + "data_type" : "CVE", + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "SPSS Analytic Server", + "version" : { + "version_data" : [ + { + "version_value" : "3.1.1.1" + } + ] + } + } + ] + }, + "vendor_name" : "IBM" + } + ] + } + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.ibm.com/support/docview.wss?uid=ibm10791853", + "title" : "IBM Security Bulletin 791853 (SPSS Analytic Server)", + "refsource" : "CONFIRM", + "url" : "https://www.ibm.com/support/docview.wss?uid=ibm10791853" + }, + { + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148689", + "name" : "ibm-spss-cve20181772-xss (148689)", + "title" : "X-Force Vulnerability Report" + } + ] + }, + "data_format" : "MITRE", + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "value" : "Cross-Site Scripting", + "lang" : "eng" + } + ] + } + ] + }, + "data_version" : "4.0", + "CVE_data_meta" : { + "ID" : "CVE-2018-1772", + "ASSIGNER" : "psirt@us.ibm.com", + "DATE_PUBLIC" : "2019-01-13T00:00:00", + "STATE" : "PUBLIC" + }, + "impact" : { + "cvssv3" : { + "TM" : { + "E" : "H", + "RC" : "C", + "RL" : "O" + }, + "BM" : { + "C" : "L", + "I" : "L", + "AC" : "L", + "SCORE" : "6.100", + "UI" : "R", + "S" : "C", + "AV" : "N", + "A" : "N", + "PR" : "N" + } + } } } From e25892248d83b1cb64dc172f1d9050c15db5defd Mon Sep 17 00:00:00 2001 From: Michael Hess Date: Tue, 15 Jan 2019 12:32:56 -0500 Subject: [PATCH 08/10] Update CVE-2017-6924.json --- 2017/6xxx/CVE-2017-6924.json | 106 ++++++++++++++++++++++++++++++----- 1 file changed, 91 insertions(+), 15 deletions(-) diff --git a/2017/6xxx/CVE-2017-6924.json b/2017/6xxx/CVE-2017-6924.json index 16129168785..3cec9ea7aa7 100644 --- a/2017/6xxx/CVE-2017-6924.json +++ b/2017/6xxx/CVE-2017-6924.json @@ -1,18 +1,94 @@ { - "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", - "ID" : "CVE-2017-6924", - "STATE" : "RESERVED" - }, - "data_format" : "MITRE", - "data_type" : "CVE", - "data_version" : "4.0", - "description" : { - "description_data" : [ - { - "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." - } + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2017-6924", + "ASSIGNER": "mlhess@drupal.org", + "DATE_PUBLIC": "", + "TITLE": "REST API can bypass comment approval - Access Bypass - Moderately Critical ", + "AKA": "", + "STATE": "PUBLIC" + }, + "source": { + "defect": [], + "advisory": "SA-CORE-2017-004", + "discovery": "UNKNOWN" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Drupal", + "product": { + "product_data": [ + { + "product_name": "Drupal Core", + "version": { + "version_data": [ + { + "version_name": "Drupal 8", + "affected": "<", + "version_value": "8.3.7", + "platform": "" + } + ] + } + } + ] + } + } ] - } + } + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Drupal 8 prior to 8.3.7; When using the REST API, users without the correct permission can post comments via REST that are approved even if the user does not have permission to post approved comments. This issue only affects sites that have the RESTful Web Services (rest) module enabled, the comment entity REST resource enabled, and where an attacker can access a user account on the site with permissions to post comments, or where anonymous users can post comments." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Access Bypass" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "url": "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-08-16/drupal-core-multiple", + "name": "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-08-16/drupal-core-multiple" + } + ] + }, + "configuration": [], + "impact": { + "cvss": { + "version": "3.0", + "attackVector": "PHYSICAL", + "attackComplexity": "HIGH", + "privilegesRequired": "HIGH", + "userInteraction": "REQUIRED", + "scope": "UNCHANGED", + "confidentialityImpact": "NONE", + "integrityImpact": "NONE", + "availabilityImpact": "NONE", + "vectorString": "CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N", + "baseScore": 0, + "baseSeverity": "NONE" + } + }, + "exploit": [], + "work_around": [], + "solution": [], + "credit": [] } From 1dcc6667a1d2ffaa08d1df97dd9baee72a28c72c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 15 Jan 2019 14:05:01 -0500 Subject: [PATCH 09/10] - Synchronized data. --- 2018/1xxx/CVE-2018-1772.json | 92 ++++++++++++++++++------------------ 2019/6xxx/CVE-2019-6317.json | 18 +++++++ 2 files changed, 63 insertions(+), 47 deletions(-) create mode 100644 2019/6xxx/CVE-2019-6317.json diff --git a/2018/1xxx/CVE-2018-1772.json b/2018/1xxx/CVE-2018-1772.json index 940bb2f4d55..6d6db476493 100644 --- a/2018/1xxx/CVE-2018-1772.json +++ b/2018/1xxx/CVE-2018-1772.json @@ -1,13 +1,10 @@ { - "description" : { - "description_data" : [ - { - "value" : "IBM SPSS Analytic Server 3.1.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 148689.", - "lang" : "eng" - } - ] + "CVE_data_meta" : { + "ASSIGNER" : "psirt@us.ibm.com", + "DATE_PUBLIC" : "2019-01-13T00:00:00", + "ID" : "CVE-2018-1772", + "STATE" : "PUBLIC" }, - "data_type" : "CVE", "affects" : { "vendor" : { "vendor_data" : [ @@ -31,60 +28,61 @@ ] } }, - "references" : { - "reference_data" : [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "name" : "https://www.ibm.com/support/docview.wss?uid=ibm10791853", - "title" : "IBM Security Bulletin 791853 (SPSS Analytic Server)", - "refsource" : "CONFIRM", - "url" : "https://www.ibm.com/support/docview.wss?uid=ibm10791853" - }, - { - "refsource" : "XF", - "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148689", - "name" : "ibm-spss-cve20181772-xss (148689)", - "title" : "X-Force Vulnerability Report" + "lang" : "eng", + "value" : "IBM SPSS Analytic Server 3.1.1.1 is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 148689." } ] }, - "data_format" : "MITRE", + "impact" : { + "cvssv3" : { + "BM" : { + "A" : "N", + "AC" : "L", + "AV" : "N", + "C" : "L", + "I" : "L", + "PR" : "N", + "S" : "C", + "SCORE" : "6.100", + "UI" : "R" + }, + "TM" : { + "E" : "H", + "RC" : "C", + "RL" : "O" + } + } + }, "problemtype" : { "problemtype_data" : [ { "description" : [ { - "value" : "Cross-Site Scripting", - "lang" : "eng" + "lang" : "eng", + "value" : "Cross-Site Scripting" } ] } ] }, - "data_version" : "4.0", - "CVE_data_meta" : { - "ID" : "CVE-2018-1772", - "ASSIGNER" : "psirt@us.ibm.com", - "DATE_PUBLIC" : "2019-01-13T00:00:00", - "STATE" : "PUBLIC" - }, - "impact" : { - "cvssv3" : { - "TM" : { - "E" : "H", - "RC" : "C", - "RL" : "O" + "references" : { + "reference_data" : [ + { + "name" : "https://www.ibm.com/support/docview.wss?uid=ibm10791853", + "refsource" : "CONFIRM", + "url" : "https://www.ibm.com/support/docview.wss?uid=ibm10791853" }, - "BM" : { - "C" : "L", - "I" : "L", - "AC" : "L", - "SCORE" : "6.100", - "UI" : "R", - "S" : "C", - "AV" : "N", - "A" : "N", - "PR" : "N" + { + "name" : "ibm-spss-cve20181772-xss(148689)", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/148689" } - } + ] } } diff --git a/2019/6xxx/CVE-2019-6317.json b/2019/6xxx/CVE-2019-6317.json new file mode 100644 index 00000000000..f0b07634de8 --- /dev/null +++ b/2019/6xxx/CVE-2019-6317.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6317", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} From 7aa5e6b0c5635f788feadf710a16fa061371fb2e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 15 Jan 2019 15:04:47 -0500 Subject: [PATCH 10/10] - Synchronized data. --- 2017/6xxx/CVE-2017-6924.json | 178 ++++++++++++++++----------------- 2018/15xxx/CVE-2018-15440.json | 168 +++++++++++++++---------------- 2018/15xxx/CVE-2018-15463.json | 168 +++++++++++++++---------------- 2019/6xxx/CVE-2019-6318.json | 18 ++++ 2019/6xxx/CVE-2019-6319.json | 18 ++++ 2019/6xxx/CVE-2019-6320.json | 18 ++++ 2019/6xxx/CVE-2019-6321.json | 18 ++++ 2019/6xxx/CVE-2019-6322.json | 18 ++++ 2019/6xxx/CVE-2019-6323.json | 18 ++++ 2019/6xxx/CVE-2019-6324.json | 18 ++++ 2019/6xxx/CVE-2019-6325.json | 18 ++++ 2019/6xxx/CVE-2019-6326.json | 18 ++++ 2019/6xxx/CVE-2019-6327.json | 18 ++++ 2019/6xxx/CVE-2019-6328.json | 18 ++++ 2019/6xxx/CVE-2019-6329.json | 18 ++++ 2019/6xxx/CVE-2019-6330.json | 18 ++++ 2019/6xxx/CVE-2019-6331.json | 18 ++++ 2019/6xxx/CVE-2019-6332.json | 18 ++++ 2019/6xxx/CVE-2019-6333.json | 18 ++++ 2019/6xxx/CVE-2019-6334.json | 18 ++++ 2019/6xxx/CVE-2019-6335.json | 18 ++++ 2019/6xxx/CVE-2019-6336.json | 18 ++++ 2019/6xxx/CVE-2019-6337.json | 18 ++++ 2019/6xxx/CVE-2019-6338.json | 18 ++++ 2019/6xxx/CVE-2019-6339.json | 18 ++++ 2019/6xxx/CVE-2019-6340.json | 18 ++++ 2019/6xxx/CVE-2019-6341.json | 18 ++++ 2019/6xxx/CVE-2019-6342.json | 18 ++++ 2019/6xxx/CVE-2019-6343.json | 18 ++++ 2019/6xxx/CVE-2019-6344.json | 18 ++++ 2019/6xxx/CVE-2019-6345.json | 18 ++++ 2019/6xxx/CVE-2019-6346.json | 18 ++++ 2019/6xxx/CVE-2019-6347.json | 18 ++++ 2019/6xxx/CVE-2019-6348.json | 18 ++++ 2019/6xxx/CVE-2019-6349.json | 18 ++++ 2019/6xxx/CVE-2019-6350.json | 18 ++++ 2019/6xxx/CVE-2019-6351.json | 18 ++++ 2019/6xxx/CVE-2019-6352.json | 18 ++++ 2019/6xxx/CVE-2019-6353.json | 18 ++++ 2019/6xxx/CVE-2019-6354.json | 18 ++++ 2019/6xxx/CVE-2019-6355.json | 18 ++++ 2019/6xxx/CVE-2019-6356.json | 18 ++++ 2019/6xxx/CVE-2019-6357.json | 18 ++++ 2019/6xxx/CVE-2019-6358.json | 18 ++++ 2019/6xxx/CVE-2019-6359.json | 18 ++++ 2019/6xxx/CVE-2019-6360.json | 18 ++++ 2019/6xxx/CVE-2019-6361.json | 18 ++++ 2019/6xxx/CVE-2019-6362.json | 18 ++++ 2019/6xxx/CVE-2019-6363.json | 18 ++++ 2019/6xxx/CVE-2019-6364.json | 18 ++++ 2019/6xxx/CVE-2019-6365.json | 18 ++++ 2019/6xxx/CVE-2019-6366.json | 18 ++++ 2019/6xxx/CVE-2019-6367.json | 18 ++++ 2019/6xxx/CVE-2019-6368.json | 18 ++++ 2019/6xxx/CVE-2019-6369.json | 18 ++++ 2019/6xxx/CVE-2019-6370.json | 18 ++++ 2019/6xxx/CVE-2019-6371.json | 18 ++++ 2019/6xxx/CVE-2019-6372.json | 18 ++++ 2019/6xxx/CVE-2019-6373.json | 18 ++++ 2019/6xxx/CVE-2019-6374.json | 18 ++++ 2019/6xxx/CVE-2019-6375.json | 18 ++++ 2019/6xxx/CVE-2019-6376.json | 18 ++++ 2019/6xxx/CVE-2019-6377.json | 18 ++++ 2019/6xxx/CVE-2019-6378.json | 18 ++++ 2019/6xxx/CVE-2019-6379.json | 18 ++++ 2019/6xxx/CVE-2019-6380.json | 18 ++++ 2019/6xxx/CVE-2019-6381.json | 18 ++++ 2019/6xxx/CVE-2019-6382.json | 18 ++++ 2019/6xxx/CVE-2019-6383.json | 18 ++++ 2019/6xxx/CVE-2019-6384.json | 18 ++++ 2019/6xxx/CVE-2019-6385.json | 18 ++++ 2019/6xxx/CVE-2019-6386.json | 18 ++++ 2019/6xxx/CVE-2019-6387.json | 18 ++++ 2019/6xxx/CVE-2019-6388.json | 18 ++++ 2019/6xxx/CVE-2019-6389.json | 18 ++++ 2019/6xxx/CVE-2019-6390.json | 18 ++++ 2019/6xxx/CVE-2019-6391.json | 18 ++++ 2019/6xxx/CVE-2019-6392.json | 18 ++++ 2019/6xxx/CVE-2019-6393.json | 18 ++++ 2019/6xxx/CVE-2019-6394.json | 18 ++++ 2019/6xxx/CVE-2019-6395.json | 18 ++++ 2019/6xxx/CVE-2019-6396.json | 18 ++++ 2019/6xxx/CVE-2019-6397.json | 18 ++++ 2019/6xxx/CVE-2019-6398.json | 18 ++++ 2019/6xxx/CVE-2019-6399.json | 18 ++++ 2019/6xxx/CVE-2019-6400.json | 18 ++++ 2019/6xxx/CVE-2019-6401.json | 18 ++++ 2019/6xxx/CVE-2019-6402.json | 18 ++++ 2019/6xxx/CVE-2019-6403.json | 18 ++++ 2019/6xxx/CVE-2019-6404.json | 18 ++++ 2019/6xxx/CVE-2019-6405.json | 18 ++++ 2019/6xxx/CVE-2019-6406.json | 18 ++++ 2019/6xxx/CVE-2019-6407.json | 18 ++++ 2019/6xxx/CVE-2019-6408.json | 18 ++++ 2019/6xxx/CVE-2019-6409.json | 18 ++++ 2019/6xxx/CVE-2019-6410.json | 18 ++++ 2019/6xxx/CVE-2019-6411.json | 18 ++++ 2019/6xxx/CVE-2019-6412.json | 18 ++++ 2019/6xxx/CVE-2019-6413.json | 18 ++++ 2019/6xxx/CVE-2019-6414.json | 18 ++++ 2019/6xxx/CVE-2019-6415.json | 18 ++++ 2019/6xxx/CVE-2019-6416.json | 18 ++++ 2019/6xxx/CVE-2019-6417.json | 18 ++++ 2019/6xxx/CVE-2019-6418.json | 18 ++++ 2019/6xxx/CVE-2019-6419.json | 18 ++++ 2019/6xxx/CVE-2019-6420.json | 18 ++++ 2019/6xxx/CVE-2019-6421.json | 18 ++++ 2019/6xxx/CVE-2019-6422.json | 18 ++++ 2019/6xxx/CVE-2019-6423.json | 18 ++++ 2019/6xxx/CVE-2019-6424.json | 18 ++++ 2019/6xxx/CVE-2019-6425.json | 18 ++++ 2019/6xxx/CVE-2019-6426.json | 18 ++++ 2019/6xxx/CVE-2019-6427.json | 18 ++++ 2019/6xxx/CVE-2019-6428.json | 18 ++++ 2019/6xxx/CVE-2019-6429.json | 18 ++++ 2019/6xxx/CVE-2019-6430.json | 18 ++++ 2019/6xxx/CVE-2019-6431.json | 18 ++++ 2019/6xxx/CVE-2019-6432.json | 18 ++++ 2019/6xxx/CVE-2019-6433.json | 18 ++++ 2019/6xxx/CVE-2019-6434.json | 18 ++++ 2019/6xxx/CVE-2019-6435.json | 18 ++++ 2019/6xxx/CVE-2019-6436.json | 18 ++++ 2019/6xxx/CVE-2019-6437.json | 18 ++++ 123 files changed, 2417 insertions(+), 257 deletions(-) create mode 100644 2019/6xxx/CVE-2019-6318.json create mode 100644 2019/6xxx/CVE-2019-6319.json create mode 100644 2019/6xxx/CVE-2019-6320.json create mode 100644 2019/6xxx/CVE-2019-6321.json create mode 100644 2019/6xxx/CVE-2019-6322.json create mode 100644 2019/6xxx/CVE-2019-6323.json create mode 100644 2019/6xxx/CVE-2019-6324.json create mode 100644 2019/6xxx/CVE-2019-6325.json create mode 100644 2019/6xxx/CVE-2019-6326.json create mode 100644 2019/6xxx/CVE-2019-6327.json create mode 100644 2019/6xxx/CVE-2019-6328.json create mode 100644 2019/6xxx/CVE-2019-6329.json create mode 100644 2019/6xxx/CVE-2019-6330.json create mode 100644 2019/6xxx/CVE-2019-6331.json create mode 100644 2019/6xxx/CVE-2019-6332.json create mode 100644 2019/6xxx/CVE-2019-6333.json create mode 100644 2019/6xxx/CVE-2019-6334.json create mode 100644 2019/6xxx/CVE-2019-6335.json create mode 100644 2019/6xxx/CVE-2019-6336.json create mode 100644 2019/6xxx/CVE-2019-6337.json create mode 100644 2019/6xxx/CVE-2019-6338.json create mode 100644 2019/6xxx/CVE-2019-6339.json create mode 100644 2019/6xxx/CVE-2019-6340.json create mode 100644 2019/6xxx/CVE-2019-6341.json create mode 100644 2019/6xxx/CVE-2019-6342.json create mode 100644 2019/6xxx/CVE-2019-6343.json create mode 100644 2019/6xxx/CVE-2019-6344.json create mode 100644 2019/6xxx/CVE-2019-6345.json create mode 100644 2019/6xxx/CVE-2019-6346.json create mode 100644 2019/6xxx/CVE-2019-6347.json create mode 100644 2019/6xxx/CVE-2019-6348.json create mode 100644 2019/6xxx/CVE-2019-6349.json create mode 100644 2019/6xxx/CVE-2019-6350.json create mode 100644 2019/6xxx/CVE-2019-6351.json create mode 100644 2019/6xxx/CVE-2019-6352.json create mode 100644 2019/6xxx/CVE-2019-6353.json create mode 100644 2019/6xxx/CVE-2019-6354.json create mode 100644 2019/6xxx/CVE-2019-6355.json create mode 100644 2019/6xxx/CVE-2019-6356.json create mode 100644 2019/6xxx/CVE-2019-6357.json create mode 100644 2019/6xxx/CVE-2019-6358.json create mode 100644 2019/6xxx/CVE-2019-6359.json create mode 100644 2019/6xxx/CVE-2019-6360.json create mode 100644 2019/6xxx/CVE-2019-6361.json create mode 100644 2019/6xxx/CVE-2019-6362.json create mode 100644 2019/6xxx/CVE-2019-6363.json create mode 100644 2019/6xxx/CVE-2019-6364.json create mode 100644 2019/6xxx/CVE-2019-6365.json create mode 100644 2019/6xxx/CVE-2019-6366.json create mode 100644 2019/6xxx/CVE-2019-6367.json create mode 100644 2019/6xxx/CVE-2019-6368.json create mode 100644 2019/6xxx/CVE-2019-6369.json create mode 100644 2019/6xxx/CVE-2019-6370.json create mode 100644 2019/6xxx/CVE-2019-6371.json create mode 100644 2019/6xxx/CVE-2019-6372.json create mode 100644 2019/6xxx/CVE-2019-6373.json create mode 100644 2019/6xxx/CVE-2019-6374.json create mode 100644 2019/6xxx/CVE-2019-6375.json create mode 100644 2019/6xxx/CVE-2019-6376.json create mode 100644 2019/6xxx/CVE-2019-6377.json create mode 100644 2019/6xxx/CVE-2019-6378.json create mode 100644 2019/6xxx/CVE-2019-6379.json create mode 100644 2019/6xxx/CVE-2019-6380.json create mode 100644 2019/6xxx/CVE-2019-6381.json create mode 100644 2019/6xxx/CVE-2019-6382.json create mode 100644 2019/6xxx/CVE-2019-6383.json create mode 100644 2019/6xxx/CVE-2019-6384.json create mode 100644 2019/6xxx/CVE-2019-6385.json create mode 100644 2019/6xxx/CVE-2019-6386.json create mode 100644 2019/6xxx/CVE-2019-6387.json create mode 100644 2019/6xxx/CVE-2019-6388.json create mode 100644 2019/6xxx/CVE-2019-6389.json create mode 100644 2019/6xxx/CVE-2019-6390.json create mode 100644 2019/6xxx/CVE-2019-6391.json create mode 100644 2019/6xxx/CVE-2019-6392.json create mode 100644 2019/6xxx/CVE-2019-6393.json create mode 100644 2019/6xxx/CVE-2019-6394.json create mode 100644 2019/6xxx/CVE-2019-6395.json create mode 100644 2019/6xxx/CVE-2019-6396.json create mode 100644 2019/6xxx/CVE-2019-6397.json create mode 100644 2019/6xxx/CVE-2019-6398.json create mode 100644 2019/6xxx/CVE-2019-6399.json create mode 100644 2019/6xxx/CVE-2019-6400.json create mode 100644 2019/6xxx/CVE-2019-6401.json create mode 100644 2019/6xxx/CVE-2019-6402.json create mode 100644 2019/6xxx/CVE-2019-6403.json create mode 100644 2019/6xxx/CVE-2019-6404.json create mode 100644 2019/6xxx/CVE-2019-6405.json create mode 100644 2019/6xxx/CVE-2019-6406.json create mode 100644 2019/6xxx/CVE-2019-6407.json create mode 100644 2019/6xxx/CVE-2019-6408.json create mode 100644 2019/6xxx/CVE-2019-6409.json create mode 100644 2019/6xxx/CVE-2019-6410.json create mode 100644 2019/6xxx/CVE-2019-6411.json create mode 100644 2019/6xxx/CVE-2019-6412.json create mode 100644 2019/6xxx/CVE-2019-6413.json create mode 100644 2019/6xxx/CVE-2019-6414.json create mode 100644 2019/6xxx/CVE-2019-6415.json create mode 100644 2019/6xxx/CVE-2019-6416.json create mode 100644 2019/6xxx/CVE-2019-6417.json create mode 100644 2019/6xxx/CVE-2019-6418.json create mode 100644 2019/6xxx/CVE-2019-6419.json create mode 100644 2019/6xxx/CVE-2019-6420.json create mode 100644 2019/6xxx/CVE-2019-6421.json create mode 100644 2019/6xxx/CVE-2019-6422.json create mode 100644 2019/6xxx/CVE-2019-6423.json create mode 100644 2019/6xxx/CVE-2019-6424.json create mode 100644 2019/6xxx/CVE-2019-6425.json create mode 100644 2019/6xxx/CVE-2019-6426.json create mode 100644 2019/6xxx/CVE-2019-6427.json create mode 100644 2019/6xxx/CVE-2019-6428.json create mode 100644 2019/6xxx/CVE-2019-6429.json create mode 100644 2019/6xxx/CVE-2019-6430.json create mode 100644 2019/6xxx/CVE-2019-6431.json create mode 100644 2019/6xxx/CVE-2019-6432.json create mode 100644 2019/6xxx/CVE-2019-6433.json create mode 100644 2019/6xxx/CVE-2019-6434.json create mode 100644 2019/6xxx/CVE-2019-6435.json create mode 100644 2019/6xxx/CVE-2019-6436.json create mode 100644 2019/6xxx/CVE-2019-6437.json diff --git a/2017/6xxx/CVE-2017-6924.json b/2017/6xxx/CVE-2017-6924.json index 3cec9ea7aa7..9b7e3bbe6d1 100644 --- a/2017/6xxx/CVE-2017-6924.json +++ b/2017/6xxx/CVE-2017-6924.json @@ -1,94 +1,94 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2017-6924", - "ASSIGNER": "mlhess@drupal.org", - "DATE_PUBLIC": "", - "TITLE": "REST API can bypass comment approval - Access Bypass - Moderately Critical ", - "AKA": "", - "STATE": "PUBLIC" - }, - "source": { - "defect": [], - "advisory": "SA-CORE-2017-004", - "discovery": "UNKNOWN" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Drupal", - "product": { - "product_data": [ - { - "product_name": "Drupal Core", - "version": { - "version_data": [ - { - "version_name": "Drupal 8", - "affected": "<", - "version_value": "8.3.7", - "platform": "" - } + "CVE_data_meta" : { + "AKA" : "", + "ASSIGNER" : "mlhess@drupal.org", + "DATE_PUBLIC" : "", + "ID" : "CVE-2017-6924", + "STATE" : "PUBLIC", + "TITLE" : "REST API can bypass comment approval - Access Bypass - Moderately Critical " + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Drupal Core", + "version" : { + "version_data" : [ + { + "affected" : "<", + "platform" : "", + "version_name" : "Drupal 8", + "version_value" : "8.3.7" + } + ] + } + } ] - } - } - ] - } - } + }, + "vendor_name" : "Drupal" + } + ] + } + }, + "configuration" : [], + "credit" : [], + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "In Drupal 8 prior to 8.3.7; When using the REST API, users without the correct permission can post comments via REST that are approved even if the user does not have permission to post approved comments. This issue only affects sites that have the RESTful Web Services (rest) module enabled, the comment entity REST resource enabled, and where an attacker can access a user account on the site with permissions to post comments, or where anonymous users can post comments." + } ] - } - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "In Drupal 8 prior to 8.3.7; When using the REST API, users without the correct permission can post comments via REST that are approved even if the user does not have permission to post approved comments. This issue only affects sites that have the RESTful Web Services (rest) module enabled, the comment entity REST resource enabled, and where an attacker can access a user account on the site with permissions to post comments, or where anonymous users can post comments." + }, + "exploit" : [], + "impact" : { + "cvss" : { + "attackComplexity" : "HIGH", + "attackVector" : "PHYSICAL", + "availabilityImpact" : "NONE", + "baseScore" : 0, + "baseSeverity" : "NONE", + "confidentialityImpact" : "NONE", + "integrityImpact" : "NONE", + "privilegesRequired" : "HIGH", + "scope" : "UNCHANGED", + "userInteraction" : "REQUIRED", + "vectorString" : "CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N", + "version" : "3.0" } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Access Bypass" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "refsource": "CONFIRM", - "url": "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-08-16/drupal-core-multiple", - "name": "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-08-16/drupal-core-multiple" - } - ] - }, - "configuration": [], - "impact": { - "cvss": { - "version": "3.0", - "attackVector": "PHYSICAL", - "attackComplexity": "HIGH", - "privilegesRequired": "HIGH", - "userInteraction": "REQUIRED", - "scope": "UNCHANGED", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "availabilityImpact": "NONE", - "vectorString": "CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N", - "baseScore": 0, - "baseSeverity": "NONE" - } - }, - "exploit": [], - "work_around": [], - "solution": [], - "credit": [] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Access Bypass" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-08-16/drupal-core-multiple", + "refsource" : "CONFIRM", + "url" : "https://www.drupal.org/forum/newsletters/security-advisories-for-drupal-core/2017-08-16/drupal-core-multiple" + } + ] + }, + "solution" : [], + "source" : { + "advisory" : "SA-CORE-2017-004", + "defect" : [], + "discovery" : "UNKNOWN" + }, + "work_around" : [] } diff --git a/2018/15xxx/CVE-2018-15440.json b/2018/15xxx/CVE-2018-15440.json index b4efdc63b98..f9c547fb47c 100644 --- a/2018/15xxx/CVE-2018-15440.json +++ b/2018/15xxx/CVE-2018-15440.json @@ -1,87 +1,87 @@ { - "CVE_data_meta": { - "ASSIGNER": "psirt@cisco.com", - "DATE_PUBLIC": "2019-01-09T16:00:00-0800", - "ID": "CVE-2018-15440", - "STATE": "PUBLIC", - "TITLE": "Cisco Identity Services Engine Multiple Cross-Site Scripting Vulnerabilities" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Cisco Identity Services Engine Software ", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "Cisco" - } + "CVE_data_meta" : { + "ASSIGNER" : "psirt@cisco.com", + "DATE_PUBLIC" : "2019-01-09T16:00:00-0800", + "ID" : "CVE-2018-15440", + "STATE" : "PUBLIC", + "TITLE" : "Cisco Identity Services Engine Multiple Cross-Site Scripting Vulnerabilities" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Cisco Identity Services Engine Software ", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "Cisco" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient sanitization of user-supplied data that is written to log files and displayed in certain web pages of the web-based management interface of an affected device. An attacker could exploit this vulnerability by convincing a user of the interface to click a specific link or view an affected log file. The injected script code may be executed in the context of the web-based management interface or allow the attacker to access sensitive browser-based information." + } + ] + }, + "exploit" : [ + { + "lang" : "eng", + "value" : "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " + } + ], + "impact" : { + "cvss" : { + "baseScore" : "6.1", + "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N ", + "version" : "3.0" + } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-79" + } ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the web interface of an affected system. The vulnerability is due to insufficient sanitization of user-supplied data that is written to log files and displayed in certain web pages of the web-based management interface of an affected device. An attacker could exploit this vulnerability by convincing a user of the interface to click a specific link or view an affected log file. The injected script code may be executed in the context of the web-based management interface or allow the attacker to access sensitive browser-based information." - } - ] - }, - "exploit": [ - { - "lang": "eng", - "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " - } - ], - "impact": { - "cvss": { - "baseScore": "6.1", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N ", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-79" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "20190109 Cisco Identity Services Engine Multiple Cross-Site Scripting Vulnerabilities", - "refsource": "CISCO", - "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-ise-multi-xss" - } - ] - }, - "source": { - "advisory": "cisco-sa-20190109-ise-multi-xss", - "defect": [ - [ - "CSCvm71860", - "CSCvm79609" - ] - ], - "discovery": "INTERNAL" - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "20190109 Cisco Identity Services Engine Multiple Cross-Site Scripting Vulnerabilities", + "refsource" : "CISCO", + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-ise-multi-xss" + } + ] + }, + "source" : { + "advisory" : "cisco-sa-20190109-ise-multi-xss", + "defect" : [ + [ + "CSCvm71860", + "CSCvm79609" + ] + ], + "discovery" : "INTERNAL" + } } diff --git a/2018/15xxx/CVE-2018-15463.json b/2018/15xxx/CVE-2018-15463.json index 31947bddf18..8287dea3b16 100644 --- a/2018/15xxx/CVE-2018-15463.json +++ b/2018/15xxx/CVE-2018-15463.json @@ -1,87 +1,87 @@ { - "CVE_data_meta": { - "ASSIGNER": "psirt@cisco.com", - "DATE_PUBLIC": "2019-01-09T16:00:00-0800", - "ID": "CVE-2018-15463", - "STATE": "PUBLIC", - "TITLE": "Cisco Identity Services Engine Multiple Cross-Site Scripting Vulnerabilities" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Cisco Identity Services Engine Software ", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "Cisco" - } + "CVE_data_meta" : { + "ASSIGNER" : "psirt@cisco.com", + "DATE_PUBLIC" : "2019-01-09T16:00:00-0800", + "ID" : "CVE-2018-15463", + "STATE" : "PUBLIC", + "TITLE" : "Cisco Identity Services Engine Multiple Cross-Site Scripting Vulnerabilities" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Cisco Identity Services Engine Software ", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "Cisco" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient input validation of some parameters passed to the web-based management interface of an affected device. An attacker could exploit this vulnerability by convincing a user of the interface to click a specific link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based management interface or allow the attacker to access sensitive browser-based information." + } + ] + }, + "exploit" : [ + { + "lang" : "eng", + "value" : "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " + } + ], + "impact" : { + "cvss" : { + "baseScore" : "6.1", + "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N ", + "version" : "3.0" + } + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-79" + } ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A vulnerability in the web-based management interface of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the web-based interface. The vulnerability is due to insufficient input validation of some parameters passed to the web-based management interface of an affected device. An attacker could exploit this vulnerability by convincing a user of the interface to click a specific link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web-based management interface or allow the attacker to access sensitive browser-based information." - } - ] - }, - "exploit": [ - { - "lang": "eng", - "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory. " - } - ], - "impact": { - "cvss": { - "baseScore": "6.1", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N ", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-79" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "20190109 Cisco Identity Services Engine Multiple Cross-Site Scripting Vulnerabilities", - "refsource": "CISCO", - "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-ise-multi-xss" - } - ] - }, - "source": { - "advisory": "cisco-sa-20190109-ise-multi-xss", - "defect": [ - [ - "CSCvm71860", - "CSCvm79609" - ] - ], - "discovery": "INTERNAL" - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "20190109 Cisco Identity Services Engine Multiple Cross-Site Scripting Vulnerabilities", + "refsource" : "CISCO", + "url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190109-ise-multi-xss" + } + ] + }, + "source" : { + "advisory" : "cisco-sa-20190109-ise-multi-xss", + "defect" : [ + [ + "CSCvm71860", + "CSCvm79609" + ] + ], + "discovery" : "INTERNAL" + } } diff --git a/2019/6xxx/CVE-2019-6318.json b/2019/6xxx/CVE-2019-6318.json new file mode 100644 index 00000000000..b430096dc3b --- /dev/null +++ b/2019/6xxx/CVE-2019-6318.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6318", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6319.json b/2019/6xxx/CVE-2019-6319.json new file mode 100644 index 00000000000..3fad99b773d --- /dev/null +++ b/2019/6xxx/CVE-2019-6319.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6319", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6320.json b/2019/6xxx/CVE-2019-6320.json new file mode 100644 index 00000000000..fdf9ceb7e30 --- /dev/null +++ b/2019/6xxx/CVE-2019-6320.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6320", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6321.json b/2019/6xxx/CVE-2019-6321.json new file mode 100644 index 00000000000..22b0d04ac06 --- /dev/null +++ b/2019/6xxx/CVE-2019-6321.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6321", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6322.json b/2019/6xxx/CVE-2019-6322.json new file mode 100644 index 00000000000..b9de9d4d7a6 --- /dev/null +++ b/2019/6xxx/CVE-2019-6322.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6322", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6323.json b/2019/6xxx/CVE-2019-6323.json new file mode 100644 index 00000000000..5ee40e88ac8 --- /dev/null +++ b/2019/6xxx/CVE-2019-6323.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6323", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6324.json b/2019/6xxx/CVE-2019-6324.json new file mode 100644 index 00000000000..c58ab6aad52 --- /dev/null +++ b/2019/6xxx/CVE-2019-6324.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6324", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6325.json b/2019/6xxx/CVE-2019-6325.json new file mode 100644 index 00000000000..49980fbd189 --- /dev/null +++ b/2019/6xxx/CVE-2019-6325.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6325", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6326.json b/2019/6xxx/CVE-2019-6326.json new file mode 100644 index 00000000000..6aad7c58d4f --- /dev/null +++ b/2019/6xxx/CVE-2019-6326.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6326", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6327.json b/2019/6xxx/CVE-2019-6327.json new file mode 100644 index 00000000000..66edc80331a --- /dev/null +++ b/2019/6xxx/CVE-2019-6327.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6327", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6328.json b/2019/6xxx/CVE-2019-6328.json new file mode 100644 index 00000000000..962e9058fca --- /dev/null +++ b/2019/6xxx/CVE-2019-6328.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6328", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6329.json b/2019/6xxx/CVE-2019-6329.json new file mode 100644 index 00000000000..6c8a7390d90 --- /dev/null +++ b/2019/6xxx/CVE-2019-6329.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6329", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6330.json b/2019/6xxx/CVE-2019-6330.json new file mode 100644 index 00000000000..85461acc0ab --- /dev/null +++ b/2019/6xxx/CVE-2019-6330.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6330", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6331.json b/2019/6xxx/CVE-2019-6331.json new file mode 100644 index 00000000000..a237e3f6c21 --- /dev/null +++ b/2019/6xxx/CVE-2019-6331.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6331", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6332.json b/2019/6xxx/CVE-2019-6332.json new file mode 100644 index 00000000000..bb962caec56 --- /dev/null +++ b/2019/6xxx/CVE-2019-6332.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6332", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6333.json b/2019/6xxx/CVE-2019-6333.json new file mode 100644 index 00000000000..499c4b39236 --- /dev/null +++ b/2019/6xxx/CVE-2019-6333.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6333", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6334.json b/2019/6xxx/CVE-2019-6334.json new file mode 100644 index 00000000000..f3d82d44146 --- /dev/null +++ b/2019/6xxx/CVE-2019-6334.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6334", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6335.json b/2019/6xxx/CVE-2019-6335.json new file mode 100644 index 00000000000..94250889c40 --- /dev/null +++ b/2019/6xxx/CVE-2019-6335.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6335", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6336.json b/2019/6xxx/CVE-2019-6336.json new file mode 100644 index 00000000000..74cd4b44b63 --- /dev/null +++ b/2019/6xxx/CVE-2019-6336.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6336", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6337.json b/2019/6xxx/CVE-2019-6337.json new file mode 100644 index 00000000000..e0ba836f1e6 --- /dev/null +++ b/2019/6xxx/CVE-2019-6337.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6337", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6338.json b/2019/6xxx/CVE-2019-6338.json new file mode 100644 index 00000000000..7f1f654431f --- /dev/null +++ b/2019/6xxx/CVE-2019-6338.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6338", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6339.json b/2019/6xxx/CVE-2019-6339.json new file mode 100644 index 00000000000..1876f399450 --- /dev/null +++ b/2019/6xxx/CVE-2019-6339.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6339", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6340.json b/2019/6xxx/CVE-2019-6340.json new file mode 100644 index 00000000000..e1cb8e20fd7 --- /dev/null +++ b/2019/6xxx/CVE-2019-6340.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6340", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6341.json b/2019/6xxx/CVE-2019-6341.json new file mode 100644 index 00000000000..30e438c99a2 --- /dev/null +++ b/2019/6xxx/CVE-2019-6341.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6341", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6342.json b/2019/6xxx/CVE-2019-6342.json new file mode 100644 index 00000000000..d6462a72276 --- /dev/null +++ b/2019/6xxx/CVE-2019-6342.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6342", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6343.json b/2019/6xxx/CVE-2019-6343.json new file mode 100644 index 00000000000..d98d151bed7 --- /dev/null +++ b/2019/6xxx/CVE-2019-6343.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6343", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6344.json b/2019/6xxx/CVE-2019-6344.json new file mode 100644 index 00000000000..d299d880629 --- /dev/null +++ b/2019/6xxx/CVE-2019-6344.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6344", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6345.json b/2019/6xxx/CVE-2019-6345.json new file mode 100644 index 00000000000..46124b9eb67 --- /dev/null +++ b/2019/6xxx/CVE-2019-6345.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6345", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6346.json b/2019/6xxx/CVE-2019-6346.json new file mode 100644 index 00000000000..a751f2b08bd --- /dev/null +++ b/2019/6xxx/CVE-2019-6346.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6346", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6347.json b/2019/6xxx/CVE-2019-6347.json new file mode 100644 index 00000000000..017e0503dad --- /dev/null +++ b/2019/6xxx/CVE-2019-6347.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6347", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6348.json b/2019/6xxx/CVE-2019-6348.json new file mode 100644 index 00000000000..4defb1e7936 --- /dev/null +++ b/2019/6xxx/CVE-2019-6348.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6348", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6349.json b/2019/6xxx/CVE-2019-6349.json new file mode 100644 index 00000000000..afb11128fa2 --- /dev/null +++ b/2019/6xxx/CVE-2019-6349.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6349", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6350.json b/2019/6xxx/CVE-2019-6350.json new file mode 100644 index 00000000000..7cd36680441 --- /dev/null +++ b/2019/6xxx/CVE-2019-6350.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6350", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6351.json b/2019/6xxx/CVE-2019-6351.json new file mode 100644 index 00000000000..3d7c9943d92 --- /dev/null +++ b/2019/6xxx/CVE-2019-6351.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6351", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6352.json b/2019/6xxx/CVE-2019-6352.json new file mode 100644 index 00000000000..6c9517a2817 --- /dev/null +++ b/2019/6xxx/CVE-2019-6352.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6352", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6353.json b/2019/6xxx/CVE-2019-6353.json new file mode 100644 index 00000000000..92d36f3f72f --- /dev/null +++ b/2019/6xxx/CVE-2019-6353.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6353", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6354.json b/2019/6xxx/CVE-2019-6354.json new file mode 100644 index 00000000000..8a5d3b41299 --- /dev/null +++ b/2019/6xxx/CVE-2019-6354.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6354", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6355.json b/2019/6xxx/CVE-2019-6355.json new file mode 100644 index 00000000000..ebd2c261349 --- /dev/null +++ b/2019/6xxx/CVE-2019-6355.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6355", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6356.json b/2019/6xxx/CVE-2019-6356.json new file mode 100644 index 00000000000..e7cbdb18177 --- /dev/null +++ b/2019/6xxx/CVE-2019-6356.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6356", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6357.json b/2019/6xxx/CVE-2019-6357.json new file mode 100644 index 00000000000..d1de920a533 --- /dev/null +++ b/2019/6xxx/CVE-2019-6357.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6357", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6358.json b/2019/6xxx/CVE-2019-6358.json new file mode 100644 index 00000000000..c7d29fa0b49 --- /dev/null +++ b/2019/6xxx/CVE-2019-6358.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6358", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6359.json b/2019/6xxx/CVE-2019-6359.json new file mode 100644 index 00000000000..4805754896b --- /dev/null +++ b/2019/6xxx/CVE-2019-6359.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6359", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6360.json b/2019/6xxx/CVE-2019-6360.json new file mode 100644 index 00000000000..68e1d912281 --- /dev/null +++ b/2019/6xxx/CVE-2019-6360.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6360", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6361.json b/2019/6xxx/CVE-2019-6361.json new file mode 100644 index 00000000000..58868da1812 --- /dev/null +++ b/2019/6xxx/CVE-2019-6361.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6361", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6362.json b/2019/6xxx/CVE-2019-6362.json new file mode 100644 index 00000000000..bc4d6c1d181 --- /dev/null +++ b/2019/6xxx/CVE-2019-6362.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6362", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6363.json b/2019/6xxx/CVE-2019-6363.json new file mode 100644 index 00000000000..a93e7869165 --- /dev/null +++ b/2019/6xxx/CVE-2019-6363.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6363", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6364.json b/2019/6xxx/CVE-2019-6364.json new file mode 100644 index 00000000000..ec1d584279c --- /dev/null +++ b/2019/6xxx/CVE-2019-6364.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6364", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6365.json b/2019/6xxx/CVE-2019-6365.json new file mode 100644 index 00000000000..cdfc69f761e --- /dev/null +++ b/2019/6xxx/CVE-2019-6365.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6365", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6366.json b/2019/6xxx/CVE-2019-6366.json new file mode 100644 index 00000000000..9148a10aaa8 --- /dev/null +++ b/2019/6xxx/CVE-2019-6366.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6366", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6367.json b/2019/6xxx/CVE-2019-6367.json new file mode 100644 index 00000000000..5f2d8c20a82 --- /dev/null +++ b/2019/6xxx/CVE-2019-6367.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6367", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6368.json b/2019/6xxx/CVE-2019-6368.json new file mode 100644 index 00000000000..5aa252890cc --- /dev/null +++ b/2019/6xxx/CVE-2019-6368.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6368", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6369.json b/2019/6xxx/CVE-2019-6369.json new file mode 100644 index 00000000000..31e381edfe9 --- /dev/null +++ b/2019/6xxx/CVE-2019-6369.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6369", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6370.json b/2019/6xxx/CVE-2019-6370.json new file mode 100644 index 00000000000..0d5441a4ad9 --- /dev/null +++ b/2019/6xxx/CVE-2019-6370.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6370", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6371.json b/2019/6xxx/CVE-2019-6371.json new file mode 100644 index 00000000000..7383a7023b9 --- /dev/null +++ b/2019/6xxx/CVE-2019-6371.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6371", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6372.json b/2019/6xxx/CVE-2019-6372.json new file mode 100644 index 00000000000..48ee7ff0d6e --- /dev/null +++ b/2019/6xxx/CVE-2019-6372.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6372", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6373.json b/2019/6xxx/CVE-2019-6373.json new file mode 100644 index 00000000000..0cba11a04b4 --- /dev/null +++ b/2019/6xxx/CVE-2019-6373.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6373", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6374.json b/2019/6xxx/CVE-2019-6374.json new file mode 100644 index 00000000000..e8a71dd49f9 --- /dev/null +++ b/2019/6xxx/CVE-2019-6374.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6374", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6375.json b/2019/6xxx/CVE-2019-6375.json new file mode 100644 index 00000000000..e3124c7b6b7 --- /dev/null +++ b/2019/6xxx/CVE-2019-6375.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6375", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6376.json b/2019/6xxx/CVE-2019-6376.json new file mode 100644 index 00000000000..e99a03b0b54 --- /dev/null +++ b/2019/6xxx/CVE-2019-6376.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6376", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6377.json b/2019/6xxx/CVE-2019-6377.json new file mode 100644 index 00000000000..a82c5c3cd36 --- /dev/null +++ b/2019/6xxx/CVE-2019-6377.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6377", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6378.json b/2019/6xxx/CVE-2019-6378.json new file mode 100644 index 00000000000..843f1ae45b3 --- /dev/null +++ b/2019/6xxx/CVE-2019-6378.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6378", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6379.json b/2019/6xxx/CVE-2019-6379.json new file mode 100644 index 00000000000..70fc39d2056 --- /dev/null +++ b/2019/6xxx/CVE-2019-6379.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6379", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6380.json b/2019/6xxx/CVE-2019-6380.json new file mode 100644 index 00000000000..07b4004bf72 --- /dev/null +++ b/2019/6xxx/CVE-2019-6380.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6380", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6381.json b/2019/6xxx/CVE-2019-6381.json new file mode 100644 index 00000000000..682914b5b0b --- /dev/null +++ b/2019/6xxx/CVE-2019-6381.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6381", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6382.json b/2019/6xxx/CVE-2019-6382.json new file mode 100644 index 00000000000..c5de11faac6 --- /dev/null +++ b/2019/6xxx/CVE-2019-6382.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6382", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6383.json b/2019/6xxx/CVE-2019-6383.json new file mode 100644 index 00000000000..19be29a6d00 --- /dev/null +++ b/2019/6xxx/CVE-2019-6383.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6383", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6384.json b/2019/6xxx/CVE-2019-6384.json new file mode 100644 index 00000000000..dd501c9fd18 --- /dev/null +++ b/2019/6xxx/CVE-2019-6384.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6384", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6385.json b/2019/6xxx/CVE-2019-6385.json new file mode 100644 index 00000000000..a6828c0d1bc --- /dev/null +++ b/2019/6xxx/CVE-2019-6385.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6385", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6386.json b/2019/6xxx/CVE-2019-6386.json new file mode 100644 index 00000000000..ab55dc1c1a6 --- /dev/null +++ b/2019/6xxx/CVE-2019-6386.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6386", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6387.json b/2019/6xxx/CVE-2019-6387.json new file mode 100644 index 00000000000..34ec867dfd5 --- /dev/null +++ b/2019/6xxx/CVE-2019-6387.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6387", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6388.json b/2019/6xxx/CVE-2019-6388.json new file mode 100644 index 00000000000..30e87f9cd00 --- /dev/null +++ b/2019/6xxx/CVE-2019-6388.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6388", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6389.json b/2019/6xxx/CVE-2019-6389.json new file mode 100644 index 00000000000..aaabbf57298 --- /dev/null +++ b/2019/6xxx/CVE-2019-6389.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6389", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6390.json b/2019/6xxx/CVE-2019-6390.json new file mode 100644 index 00000000000..cdbb0272eaa --- /dev/null +++ b/2019/6xxx/CVE-2019-6390.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6390", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6391.json b/2019/6xxx/CVE-2019-6391.json new file mode 100644 index 00000000000..2afe0110aff --- /dev/null +++ b/2019/6xxx/CVE-2019-6391.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6391", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6392.json b/2019/6xxx/CVE-2019-6392.json new file mode 100644 index 00000000000..af2eace43a9 --- /dev/null +++ b/2019/6xxx/CVE-2019-6392.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6392", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6393.json b/2019/6xxx/CVE-2019-6393.json new file mode 100644 index 00000000000..ba66bc2b326 --- /dev/null +++ b/2019/6xxx/CVE-2019-6393.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6393", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6394.json b/2019/6xxx/CVE-2019-6394.json new file mode 100644 index 00000000000..d37af6de84c --- /dev/null +++ b/2019/6xxx/CVE-2019-6394.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6394", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6395.json b/2019/6xxx/CVE-2019-6395.json new file mode 100644 index 00000000000..32beba0fb4a --- /dev/null +++ b/2019/6xxx/CVE-2019-6395.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6395", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6396.json b/2019/6xxx/CVE-2019-6396.json new file mode 100644 index 00000000000..4c1ae59883a --- /dev/null +++ b/2019/6xxx/CVE-2019-6396.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6396", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6397.json b/2019/6xxx/CVE-2019-6397.json new file mode 100644 index 00000000000..0028fd05cf4 --- /dev/null +++ b/2019/6xxx/CVE-2019-6397.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6397", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6398.json b/2019/6xxx/CVE-2019-6398.json new file mode 100644 index 00000000000..a8b11d16588 --- /dev/null +++ b/2019/6xxx/CVE-2019-6398.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6398", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6399.json b/2019/6xxx/CVE-2019-6399.json new file mode 100644 index 00000000000..971bc83dd79 --- /dev/null +++ b/2019/6xxx/CVE-2019-6399.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6399", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6400.json b/2019/6xxx/CVE-2019-6400.json new file mode 100644 index 00000000000..dadd4397d11 --- /dev/null +++ b/2019/6xxx/CVE-2019-6400.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6400", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6401.json b/2019/6xxx/CVE-2019-6401.json new file mode 100644 index 00000000000..867fed504e5 --- /dev/null +++ b/2019/6xxx/CVE-2019-6401.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6401", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6402.json b/2019/6xxx/CVE-2019-6402.json new file mode 100644 index 00000000000..f90fe3dfd0f --- /dev/null +++ b/2019/6xxx/CVE-2019-6402.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6402", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6403.json b/2019/6xxx/CVE-2019-6403.json new file mode 100644 index 00000000000..8c5cd813afa --- /dev/null +++ b/2019/6xxx/CVE-2019-6403.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6403", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6404.json b/2019/6xxx/CVE-2019-6404.json new file mode 100644 index 00000000000..77e8cf3ff94 --- /dev/null +++ b/2019/6xxx/CVE-2019-6404.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6404", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6405.json b/2019/6xxx/CVE-2019-6405.json new file mode 100644 index 00000000000..e85fe76ecdf --- /dev/null +++ b/2019/6xxx/CVE-2019-6405.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6405", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6406.json b/2019/6xxx/CVE-2019-6406.json new file mode 100644 index 00000000000..ac4116681ba --- /dev/null +++ b/2019/6xxx/CVE-2019-6406.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6406", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6407.json b/2019/6xxx/CVE-2019-6407.json new file mode 100644 index 00000000000..210099fb333 --- /dev/null +++ b/2019/6xxx/CVE-2019-6407.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6407", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6408.json b/2019/6xxx/CVE-2019-6408.json new file mode 100644 index 00000000000..a0c6695987b --- /dev/null +++ b/2019/6xxx/CVE-2019-6408.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6408", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6409.json b/2019/6xxx/CVE-2019-6409.json new file mode 100644 index 00000000000..2a797e87e6a --- /dev/null +++ b/2019/6xxx/CVE-2019-6409.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6409", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6410.json b/2019/6xxx/CVE-2019-6410.json new file mode 100644 index 00000000000..53fb555fe74 --- /dev/null +++ b/2019/6xxx/CVE-2019-6410.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6410", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6411.json b/2019/6xxx/CVE-2019-6411.json new file mode 100644 index 00000000000..cdd2b0c4bab --- /dev/null +++ b/2019/6xxx/CVE-2019-6411.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6411", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6412.json b/2019/6xxx/CVE-2019-6412.json new file mode 100644 index 00000000000..200487ec9f3 --- /dev/null +++ b/2019/6xxx/CVE-2019-6412.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6412", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6413.json b/2019/6xxx/CVE-2019-6413.json new file mode 100644 index 00000000000..10976610b01 --- /dev/null +++ b/2019/6xxx/CVE-2019-6413.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6413", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6414.json b/2019/6xxx/CVE-2019-6414.json new file mode 100644 index 00000000000..ca65e7ef03e --- /dev/null +++ b/2019/6xxx/CVE-2019-6414.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6414", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6415.json b/2019/6xxx/CVE-2019-6415.json new file mode 100644 index 00000000000..5bbaeef9185 --- /dev/null +++ b/2019/6xxx/CVE-2019-6415.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6415", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6416.json b/2019/6xxx/CVE-2019-6416.json new file mode 100644 index 00000000000..c20d1191244 --- /dev/null +++ b/2019/6xxx/CVE-2019-6416.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6416", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6417.json b/2019/6xxx/CVE-2019-6417.json new file mode 100644 index 00000000000..bef5f64aa38 --- /dev/null +++ b/2019/6xxx/CVE-2019-6417.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6417", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6418.json b/2019/6xxx/CVE-2019-6418.json new file mode 100644 index 00000000000..0a83934feee --- /dev/null +++ b/2019/6xxx/CVE-2019-6418.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6418", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6419.json b/2019/6xxx/CVE-2019-6419.json new file mode 100644 index 00000000000..e771f29187c --- /dev/null +++ b/2019/6xxx/CVE-2019-6419.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6419", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6420.json b/2019/6xxx/CVE-2019-6420.json new file mode 100644 index 00000000000..3a4c0d3da83 --- /dev/null +++ b/2019/6xxx/CVE-2019-6420.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6420", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6421.json b/2019/6xxx/CVE-2019-6421.json new file mode 100644 index 00000000000..fba35d4a645 --- /dev/null +++ b/2019/6xxx/CVE-2019-6421.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6421", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6422.json b/2019/6xxx/CVE-2019-6422.json new file mode 100644 index 00000000000..57c1d5f2cc8 --- /dev/null +++ b/2019/6xxx/CVE-2019-6422.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6422", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6423.json b/2019/6xxx/CVE-2019-6423.json new file mode 100644 index 00000000000..3488fb1418b --- /dev/null +++ b/2019/6xxx/CVE-2019-6423.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6423", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6424.json b/2019/6xxx/CVE-2019-6424.json new file mode 100644 index 00000000000..7f57131ad0a --- /dev/null +++ b/2019/6xxx/CVE-2019-6424.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6424", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6425.json b/2019/6xxx/CVE-2019-6425.json new file mode 100644 index 00000000000..3a83b5fb21f --- /dev/null +++ b/2019/6xxx/CVE-2019-6425.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6425", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6426.json b/2019/6xxx/CVE-2019-6426.json new file mode 100644 index 00000000000..e0a6c19ac39 --- /dev/null +++ b/2019/6xxx/CVE-2019-6426.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6426", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6427.json b/2019/6xxx/CVE-2019-6427.json new file mode 100644 index 00000000000..502bba30426 --- /dev/null +++ b/2019/6xxx/CVE-2019-6427.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6427", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6428.json b/2019/6xxx/CVE-2019-6428.json new file mode 100644 index 00000000000..1d06a84d088 --- /dev/null +++ b/2019/6xxx/CVE-2019-6428.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6428", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6429.json b/2019/6xxx/CVE-2019-6429.json new file mode 100644 index 00000000000..640c0418814 --- /dev/null +++ b/2019/6xxx/CVE-2019-6429.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6429", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6430.json b/2019/6xxx/CVE-2019-6430.json new file mode 100644 index 00000000000..6cde391e6d1 --- /dev/null +++ b/2019/6xxx/CVE-2019-6430.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6430", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6431.json b/2019/6xxx/CVE-2019-6431.json new file mode 100644 index 00000000000..08baea040a9 --- /dev/null +++ b/2019/6xxx/CVE-2019-6431.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6431", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6432.json b/2019/6xxx/CVE-2019-6432.json new file mode 100644 index 00000000000..6cf623d3a19 --- /dev/null +++ b/2019/6xxx/CVE-2019-6432.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6432", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6433.json b/2019/6xxx/CVE-2019-6433.json new file mode 100644 index 00000000000..cbbc197550e --- /dev/null +++ b/2019/6xxx/CVE-2019-6433.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6433", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6434.json b/2019/6xxx/CVE-2019-6434.json new file mode 100644 index 00000000000..9b8368c4837 --- /dev/null +++ b/2019/6xxx/CVE-2019-6434.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6434", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6435.json b/2019/6xxx/CVE-2019-6435.json new file mode 100644 index 00000000000..7cb7e473556 --- /dev/null +++ b/2019/6xxx/CVE-2019-6435.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6435", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6436.json b/2019/6xxx/CVE-2019-6436.json new file mode 100644 index 00000000000..ff97c9bf0c9 --- /dev/null +++ b/2019/6xxx/CVE-2019-6436.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6436", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/6xxx/CVE-2019-6437.json b/2019/6xxx/CVE-2019-6437.json new file mode 100644 index 00000000000..51b29a241ad --- /dev/null +++ b/2019/6xxx/CVE-2019-6437.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-6437", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}