From bc39e8f4b0e2a454a7fd305db478d0d298d48640 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sat, 23 Mar 2019 18:00:43 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2019/5xxx/CVE-2019-5736.json | 5 +++ 2019/9xxx/CVE-2019-9947.json | 62 +++++++++++++++++++++++++++++++++ 2019/9xxx/CVE-2019-9948.json | 67 ++++++++++++++++++++++++++++++++++++ 2019/9xxx/CVE-2019-9949.json | 18 ++++++++++ 2019/9xxx/CVE-2019-9950.json | 18 ++++++++++ 2019/9xxx/CVE-2019-9951.json | 18 ++++++++++ 2019/9xxx/CVE-2019-9952.json | 18 ++++++++++ 2019/9xxx/CVE-2019-9953.json | 18 ++++++++++ 2019/9xxx/CVE-2019-9954.json | 18 ++++++++++ 9 files changed, 242 insertions(+) create mode 100644 2019/9xxx/CVE-2019-9947.json create mode 100644 2019/9xxx/CVE-2019-9948.json create mode 100644 2019/9xxx/CVE-2019-9949.json create mode 100644 2019/9xxx/CVE-2019-9950.json create mode 100644 2019/9xxx/CVE-2019-9951.json create mode 100644 2019/9xxx/CVE-2019-9952.json create mode 100644 2019/9xxx/CVE-2019-9953.json create mode 100644 2019/9xxx/CVE-2019-9954.json diff --git a/2019/5xxx/CVE-2019-5736.json b/2019/5xxx/CVE-2019-5736.json index cd3049cb3ca..45b87446617 100644 --- a/2019/5xxx/CVE-2019-5736.json +++ b/2019/5xxx/CVE-2019-5736.json @@ -191,6 +191,11 @@ "refsource": "MLIST", "name": "[mesos-user] 20190323 CVE-2019-0204: Some Mesos components can be overwritten making arbitrary code execution possible.", "url": "https://lists.apache.org/thread.html/a258757af84c5074dc7bf932622020fd4f60cef65a84290380386706@%3Cuser.mesos.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[oss-security] 20190323 CVE-2019-0204: Some Mesos components can be overwritten making arbitrary code execution possible.", + "url": "http://www.openwall.com/lists/oss-security/2019/03/23/1" } ] } diff --git a/2019/9xxx/CVE-2019-9947.json b/2019/9xxx/CVE-2019-9947.json new file mode 100644 index 00000000000..69efb808fa3 --- /dev/null +++ b/2019/9xxx/CVE-2019-9947.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-9947", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.2. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \\r\\n (specifically in the query string or PATH_INFO) followed by an HTTP header or a Redis command. This is similar to CVE-2019-9740." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugs.python.org/issue35906", + "refsource": "MISC", + "name": "https://bugs.python.org/issue35906" + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9948.json b/2019/9xxx/CVE-2019-9948.json new file mode 100644 index 00000000000..48f7a14015d --- /dev/null +++ b/2019/9xxx/CVE-2019-9948.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-9948", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://bugs.python.org/issue35907", + "refsource": "MISC", + "name": "https://bugs.python.org/issue35907" + }, + { + "url": "https://github.com/python/cpython/pull/11842", + "refsource": "MISC", + "name": "https://github.com/python/cpython/pull/11842" + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9949.json b/2019/9xxx/CVE-2019-9949.json new file mode 100644 index 00000000000..e176f4bf109 --- /dev/null +++ b/2019/9xxx/CVE-2019-9949.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-9949", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9950.json b/2019/9xxx/CVE-2019-9950.json new file mode 100644 index 00000000000..f85f37e0a32 --- /dev/null +++ b/2019/9xxx/CVE-2019-9950.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-9950", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9951.json b/2019/9xxx/CVE-2019-9951.json new file mode 100644 index 00000000000..427bff438de --- /dev/null +++ b/2019/9xxx/CVE-2019-9951.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-9951", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9952.json b/2019/9xxx/CVE-2019-9952.json new file mode 100644 index 00000000000..7a650720b66 --- /dev/null +++ b/2019/9xxx/CVE-2019-9952.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-9952", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9953.json b/2019/9xxx/CVE-2019-9953.json new file mode 100644 index 00000000000..0a7209829c6 --- /dev/null +++ b/2019/9xxx/CVE-2019-9953.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-9953", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9954.json b/2019/9xxx/CVE-2019-9954.json new file mode 100644 index 00000000000..18c9dcefb11 --- /dev/null +++ b/2019/9xxx/CVE-2019-9954.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-9954", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file