diff --git a/2018/8xxx/CVE-2018-8037.json b/2018/8xxx/CVE-2018-8037.json index 3c0c78933cc..d09420afb1b 100644 --- a/2018/8xxx/CVE-2018-8037.json +++ b/2018/8xxx/CVE-2018-8037.json @@ -145,6 +145,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:1529", "url": "https://access.redhat.com/errata/RHSA-2019:1529" + }, + { + "refsource": "MLIST", + "name": "[tomcat-users] 20191001 Additional Information on Apache Tomcat CVE-2018-8037", + "url": "https://lists.apache.org/thread.html/2ee3af8a43cb019e7898c9330cc8e73306553a27f2e4735dfb522d39@%3Cusers.tomcat.apache.org%3E" } ] } diff --git a/2019/14xxx/CVE-2019-14821.json b/2019/14xxx/CVE-2019-14821.json index 361b1ff6430..0c6ea7fdc16 100644 --- a/2019/14xxx/CVE-2019-14821.json +++ b/2019/14xxx/CVE-2019-14821.json @@ -73,6 +73,11 @@ "refsource": "DEBIAN", "name": "DSA-4531", "url": "https://www.debian.org/security/2019/dsa-4531" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20191001 [SECURITY] [DLA 1940-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html" } ] }, diff --git a/2019/14xxx/CVE-2019-14835.json b/2019/14xxx/CVE-2019-14835.json index 5e6fac2fd3b..a15bed28ae9 100644 --- a/2019/14xxx/CVE-2019-14835.json +++ b/2019/14xxx/CVE-2019-14835.json @@ -188,6 +188,11 @@ "refsource": "UBUNTU", "name": "USN-4135-1", "url": "https://usn.ubuntu.com/4135-1/" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20191001 [SECURITY] [DLA 1940-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html" } ] }, diff --git a/2019/14xxx/CVE-2019-14953.json b/2019/14xxx/CVE-2019-14953.json new file mode 100644 index 00000000000..ce1bc396293 --- /dev/null +++ b/2019/14xxx/CVE-2019-14953.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14953", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "JetBrains YouTrack versions before 2019.2.53938 had a possible XSS through issue attachments when using the Firefox browser." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/", + "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14955.json b/2019/14xxx/CVE-2019-14955.json new file mode 100644 index 00000000000..c6f7a578a24 --- /dev/null +++ b/2019/14xxx/CVE-2019-14955.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14955", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In JetBrains Hub versions earlier than 2018.4.11436, there was no option to force a user to change the password and no password expiration policy was implemented." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/", + "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14957.json b/2019/14xxx/CVE-2019-14957.json new file mode 100644 index 00000000000..f7c4f305214 --- /dev/null +++ b/2019/14xxx/CVE-2019-14957.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14957", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The JetBrains Vim plugin before version 0.52 was storing individual project data in the global vim_settings.xml file. This xml file could be synchronized to a publicly accessible GitHub repository." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/", + "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14960.json b/2019/14xxx/CVE-2019-14960.json new file mode 100644 index 00000000000..54571c4678c --- /dev/null +++ b/2019/14xxx/CVE-2019-14960.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14960", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "JetBrains Rider before 2019.1.2 was using an unsigned JetBrains.Rider.Unity.Editor.Plugin.Repacked.dll file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/", + "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15038.json b/2019/15xxx/CVE-2019-15038.json new file mode 100644 index 00000000000..51c38d6398f --- /dev/null +++ b/2019/15xxx/CVE-2019-15038.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15038", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in JetBrains TeamCity 2018.2.4. The TeamCity server was not using some security-related HTTP headers. The issue was fixed in TeamCity 2019.1." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/", + "url": "https://blog.jetbrains.com/blog/2019/09/26/jetbrains-security-bulletin-q2-2019/" + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15117.json b/2019/15xxx/CVE-2019-15117.json index aec034a41f7..4fdb62c4e87 100644 --- a/2019/15xxx/CVE-2019-15117.json +++ b/2019/15xxx/CVE-2019-15117.json @@ -91,6 +91,11 @@ "refsource": "DEBIAN", "name": "DSA-4531", "url": "https://www.debian.org/security/2019/dsa-4531" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20191001 [SECURITY] [DLA 1940-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html" } ] } diff --git a/2019/15xxx/CVE-2019-15118.json b/2019/15xxx/CVE-2019-15118.json index a3d46cf93a2..261a7cb18c8 100644 --- a/2019/15xxx/CVE-2019-15118.json +++ b/2019/15xxx/CVE-2019-15118.json @@ -91,6 +91,11 @@ "refsource": "DEBIAN", "name": "DSA-4531", "url": "https://www.debian.org/security/2019/dsa-4531" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20191001 [SECURITY] [DLA 1940-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html" } ] } diff --git a/2019/15xxx/CVE-2019-15902.json b/2019/15xxx/CVE-2019-15902.json index 70fad633921..67dd7362a25 100644 --- a/2019/15xxx/CVE-2019-15902.json +++ b/2019/15xxx/CVE-2019-15902.json @@ -76,6 +76,11 @@ "refsource": "DEBIAN", "name": "DSA-4531", "url": "https://www.debian.org/security/2019/dsa-4531" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20191001 [SECURITY] [DLA 1940-1] linux-4.9 security update", + "url": "https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html" } ] } diff --git a/2019/17xxx/CVE-2019-17063.json b/2019/17xxx/CVE-2019-17063.json new file mode 100644 index 00000000000..9a9f1cc727d --- /dev/null +++ b/2019/17xxx/CVE-2019-17063.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-17063", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Snowtide PDFxStream before 3.7.1 (for Java), a crafted PDF file can trigger an extremely long running computation because of page-tree mishandling." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://downloads.snowtide.com/CHANGELOG.html", + "refsource": "MISC", + "name": "http://downloads.snowtide.com/CHANGELOG.html" + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17064.json b/2019/17xxx/CVE-2019-17064.json new file mode 100644 index 00000000000..4089b3c9ecd --- /dev/null +++ b/2019/17xxx/CVE-2019-17064.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-17064", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Catalog.cc in Xpdf 4.02 has a NULL pointer dereference because Catalog.pageLabels is initialized too late in the Catalog constructor." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41890", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41890" + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9511.json b/2019/9xxx/CVE-2019-9511.json index a942679665b..94f2d20e882 100644 --- a/2019/9xxx/CVE-2019-9511.json +++ b/2019/9xxx/CVE-2019-9511.json @@ -218,6 +218,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:2939", "url": "https://access.redhat.com/errata/RHSA-2019:2939" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2019:2949", + "url": "https://access.redhat.com/errata/RHSA-2019:2949" } ] }, diff --git a/2019/9xxx/CVE-2019-9513.json b/2019/9xxx/CVE-2019-9513.json index cf5d935914c..bc2cc1e2067 100644 --- a/2019/9xxx/CVE-2019-9513.json +++ b/2019/9xxx/CVE-2019-9513.json @@ -218,6 +218,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:2939", "url": "https://access.redhat.com/errata/RHSA-2019:2939" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2019:2949", + "url": "https://access.redhat.com/errata/RHSA-2019:2949" } ] }, diff --git a/2019/9xxx/CVE-2019-9516.json b/2019/9xxx/CVE-2019-9516.json index f7264294928..70548ffc5e8 100644 --- a/2019/9xxx/CVE-2019-9516.json +++ b/2019/9xxx/CVE-2019-9516.json @@ -218,6 +218,11 @@ "refsource": "REDHAT", "name": "RHSA-2019:2946", "url": "https://access.redhat.com/errata/RHSA-2019:2946" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2019:2950", + "url": "https://access.redhat.com/errata/RHSA-2019:2950" } ] }, diff --git a/2019/9xxx/CVE-2019-9517.json b/2019/9xxx/CVE-2019-9517.json index 5777eb48033..bc096bb40a1 100644 --- a/2019/9xxx/CVE-2019-9517.json +++ b/2019/9xxx/CVE-2019-9517.json @@ -218,6 +218,16 @@ "refsource": "REDHAT", "name": "RHSA-2019:2946", "url": "https://access.redhat.com/errata/RHSA-2019:2946" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2019:2950", + "url": "https://access.redhat.com/errata/RHSA-2019:2950" + }, + { + "refsource": "REDHAT", + "name": "RHSA-2019:2949", + "url": "https://access.redhat.com/errata/RHSA-2019:2949" } ] },