diff --git a/2018/12xxx/CVE-2018-12159.json b/2018/12xxx/CVE-2018-12159.json index 25a27469891..84a1d150f09 100644 --- a/2018/12xxx/CVE-2018-12159.json +++ b/2018/12xxx/CVE-2018-12159.json @@ -1,9 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "DATE_PUBLIC" : "2019-02-12T00:00:00", "ID" : "CVE-2018-12159", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -12,7 +35,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Buffer overflow in the command-line interface for Intel(R) PROSet Wireless v20.50 and before may allow an authenticated user to potentially enable denial of service via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00169.html", + "refsource" : "CONFIRM", + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00169.html" } ] } diff --git a/2018/3xxx/CVE-2018-3700.json b/2018/3xxx/CVE-2018-3700.json index 26e5dd8e20d..72a46a2b549 100644 --- a/2018/3xxx/CVE-2018-3700.json +++ b/2018/3xxx/CVE-2018-3700.json @@ -1,9 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "DATE_PUBLIC" : "2019-02-12T00:00:00", "ID" : "CVE-2018-3700", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -12,7 +35,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Code injection vulnerability in the installer for Intel(R) USB 3.0 eXtensible Host Controller Driver for Microsoft Windows 7 before version 5.0.4.43v2 may allow a user to potentially enable escalation of privilege via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00200.html", + "refsource" : "CONFIRM", + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00200.html" } ] } diff --git a/2019/0xxx/CVE-2019-0101.json b/2019/0xxx/CVE-2019-0101.json index ec8e2c30d1e..c0520f275ec 100644 --- a/2019/0xxx/CVE-2019-0101.json +++ b/2019/0xxx/CVE-2019-0101.json @@ -1,9 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "DATE_PUBLIC" : "2019-02-12T00:00:00", "ID" : "CVE-2019-0101", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -12,7 +35,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Authentication bypass in the Intel Unite(R) solution versions 3.2 through 3.3 may allow an unauthenticated user to potentially enable escalation of privilege to the Intel Unite(R) Solution administrative portal via network access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00214.html", + "refsource" : "CONFIRM", + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00214.html" } ] } diff --git a/2019/0xxx/CVE-2019-0102.json b/2019/0xxx/CVE-2019-0102.json index b427159ba59..2a14d533e2a 100644 --- a/2019/0xxx/CVE-2019-0102.json +++ b/2019/0xxx/CVE-2019-0102.json @@ -1,9 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "DATE_PUBLIC" : "2019-02-12T00:00:00", "ID" : "CVE-2019-0102", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -12,7 +35,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Insufficient session authentication in web server for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an unauthenticated user to potentially enable escalation of privilege via network access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html", + "refsource" : "CONFIRM", + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html" } ] } diff --git a/2019/0xxx/CVE-2019-0103.json b/2019/0xxx/CVE-2019-0103.json index 5fef2cb9960..54025bcf2b9 100644 --- a/2019/0xxx/CVE-2019-0103.json +++ b/2019/0xxx/CVE-2019-0103.json @@ -1,9 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "DATE_PUBLIC" : "2019-02-12T00:00:00", "ID" : "CVE-2019-0103", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -12,7 +35,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Insufficient file protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html", + "refsource" : "CONFIRM", + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html" } ] } diff --git a/2019/0xxx/CVE-2019-0104.json b/2019/0xxx/CVE-2019-0104.json index d6ccbb12d29..91953c6ec73 100644 --- a/2019/0xxx/CVE-2019-0104.json +++ b/2019/0xxx/CVE-2019-0104.json @@ -1,9 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "DATE_PUBLIC" : "2019-02-12T00:00:00", "ID" : "CVE-2019-0104", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -12,7 +35,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Insufficient file protection in uninstall routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html", + "refsource" : "CONFIRM", + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html" } ] } diff --git a/2019/0xxx/CVE-2019-0105.json b/2019/0xxx/CVE-2019-0105.json index 398751da74e..44c88677f38 100644 --- a/2019/0xxx/CVE-2019-0105.json +++ b/2019/0xxx/CVE-2019-0105.json @@ -1,9 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "DATE_PUBLIC" : "2019-02-12T00:00:00", "ID" : "CVE-2019-0105", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -12,7 +35,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Insufficient file permissions checking in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow authenticated user to potentially enable escalation of privilege via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html", + "refsource" : "CONFIRM", + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html" } ] } diff --git a/2019/0xxx/CVE-2019-0106.json b/2019/0xxx/CVE-2019-0106.json index 934b7e33487..895936a9471 100644 --- a/2019/0xxx/CVE-2019-0106.json +++ b/2019/0xxx/CVE-2019-0106.json @@ -1,9 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "DATE_PUBLIC" : "2019-02-12T00:00:00", "ID" : "CVE-2019-0106", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -12,7 +35,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Insufficient run protection in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow a privileged user to potentially enable escalation of privilege via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html", + "refsource" : "CONFIRM", + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html" } ] } diff --git a/2019/0xxx/CVE-2019-0107.json b/2019/0xxx/CVE-2019-0107.json index 1acb3ae9b33..a14d6098c6d 100644 --- a/2019/0xxx/CVE-2019-0107.json +++ b/2019/0xxx/CVE-2019-0107.json @@ -1,9 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "DATE_PUBLIC" : "2019-02-12T00:00:00", "ID" : "CVE-2019-0107", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -12,7 +35,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Insufficient user prompt in install routine for Intel(R) Data Center Manager SDK before version 5.0.2 may allow a privileged user to potentially enable escalation of privilege via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html", + "refsource" : "CONFIRM", + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html" } ] } diff --git a/2019/0xxx/CVE-2019-0108.json b/2019/0xxx/CVE-2019-0108.json index 548cadea12d..3a1982b9325 100644 --- a/2019/0xxx/CVE-2019-0108.json +++ b/2019/0xxx/CVE-2019-0108.json @@ -1,9 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "DATE_PUBLIC" : "2019-02-12T00:00:00", "ID" : "CVE-2019-0108", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -12,7 +35,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Improper file permissions for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable disclosure of information via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html", + "refsource" : "CONFIRM", + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html" } ] } diff --git a/2019/0xxx/CVE-2019-0109.json b/2019/0xxx/CVE-2019-0109.json index cdffc0385be..0dd080e4c24 100644 --- a/2019/0xxx/CVE-2019-0109.json +++ b/2019/0xxx/CVE-2019-0109.json @@ -1,9 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "DATE_PUBLIC" : "2019-02-12T00:00:00", "ID" : "CVE-2019-0109", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -12,7 +35,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Improper folder permissions in Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable escalation of privilege via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html", + "refsource" : "CONFIRM", + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html" } ] } diff --git a/2019/0xxx/CVE-2019-0110.json b/2019/0xxx/CVE-2019-0110.json index e8a4af6ce08..68e9d67b088 100644 --- a/2019/0xxx/CVE-2019-0110.json +++ b/2019/0xxx/CVE-2019-0110.json @@ -1,9 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "DATE_PUBLIC" : "2019-02-12T00:00:00", "ID" : "CVE-2019-0110", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -12,7 +35,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Insufficient key management for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html", + "refsource" : "CONFIRM", + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html" } ] } diff --git a/2019/0xxx/CVE-2019-0111.json b/2019/0xxx/CVE-2019-0111.json index 60387773df5..7fd2d94b4fd 100644 --- a/2019/0xxx/CVE-2019-0111.json +++ b/2019/0xxx/CVE-2019-0111.json @@ -1,9 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "DATE_PUBLIC" : "2019-02-12T00:00:00", "ID" : "CVE-2019-0111", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -12,7 +35,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Improper file permissions for Intel(R) Data Center Manager SDK before version 5.0.2 may allow an authenticated user to potentially enable information disclosure via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html", + "refsource" : "CONFIRM", + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html" } ] } diff --git a/2019/0xxx/CVE-2019-0112.json b/2019/0xxx/CVE-2019-0112.json index cf547601aed..6127a79f469 100644 --- a/2019/0xxx/CVE-2019-0112.json +++ b/2019/0xxx/CVE-2019-0112.json @@ -1,9 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "DATE_PUBLIC" : "2019-02-12T00:00:00", "ID" : "CVE-2019-0112", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -12,7 +35,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Improper flow control in crypto routines for Intel(R) Data Center Manager SDK before version 5.0.2 may allow a privileged user to potentially enable a denial of service via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html", + "refsource" : "CONFIRM", + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00215.html" } ] } diff --git a/2019/0xxx/CVE-2019-0127.json b/2019/0xxx/CVE-2019-0127.json index 68611975bab..62514835f87 100644 --- a/2019/0xxx/CVE-2019-0127.json +++ b/2019/0xxx/CVE-2019-0127.json @@ -1,9 +1,32 @@ { "CVE_data_meta" : { - "ASSIGNER" : "cve@mitre.org", + "ASSIGNER" : "secure@intel.com", "DATE_PUBLIC" : "2019-02-12T00:00:00", "ID" : "CVE-2019-0127", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -12,7 +35,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Logic error in the installer for Intel(R) OpenVINO(TM) 2018 R3 and before for Linux may allow a privileged user to potentially enable information disclosure via local access." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00222.html", + "refsource" : "CONFIRM", + "url" : "https://www.intel.com/content/www/us/en/security-center/advisory/INTEL-SA-00222.html" } ] } diff --git a/2019/8xxx/CVE-2019-8904.json b/2019/8xxx/CVE-2019-8904.json new file mode 100644 index 00000000000..c9af99c162d --- /dev/null +++ b/2019/8xxx/CVE-2019-8904.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-8904", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "do_bid_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printf and file_vprintf." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugs.astron.com/view.php?id=62", + "refsource" : "MISC", + "url" : "https://bugs.astron.com/view.php?id=62" + } + ] + } +} diff --git a/2019/8xxx/CVE-2019-8905.json b/2019/8xxx/CVE-2019-8905.json new file mode 100644 index 00000000000..0d5b6749130 --- /dev/null +++ b/2019/8xxx/CVE-2019-8905.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-8905", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "do_core_note in readelf.c in libmagic.a in file 5.35 has a stack-based buffer over-read, related to file_printable, a different vulnerability than CVE-2018-10360." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugs.astron.com/view.php?id=63", + "refsource" : "MISC", + "url" : "https://bugs.astron.com/view.php?id=63" + } + ] + } +} diff --git a/2019/8xxx/CVE-2019-8906.json b/2019/8xxx/CVE-2019-8906.json new file mode 100644 index 00000000000..69ccfc83678 --- /dev/null +++ b/2019/8xxx/CVE-2019-8906.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-8906", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "do_core_note in readelf.c in libmagic.a in file 5.35 has an out-of-bounds read because memcpy is misused." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugs.astron.com/view.php?id=64", + "refsource" : "MISC", + "url" : "https://bugs.astron.com/view.php?id=64" + }, + { + "name" : "https://github.com/file/file/commit/2858eaf99f6cc5aae129bcbf1e24ad160240185f", + "refsource" : "MISC", + "url" : "https://github.com/file/file/commit/2858eaf99f6cc5aae129bcbf1e24ad160240185f" + } + ] + } +} diff --git a/2019/8xxx/CVE-2019-8907.json b/2019/8xxx/CVE-2019-8907.json new file mode 100644 index 00000000000..5a8e37a934b --- /dev/null +++ b/2019/8xxx/CVE-2019-8907.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-8907", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "do_core_note in readelf.c in libmagic.a in file 5.35 allows remote attackers to cause a denial of service (stack corruption and application crash) or possibly have unspecified other impact." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugs.astron.com/view.php?id=65", + "refsource" : "MISC", + "url" : "https://bugs.astron.com/view.php?id=65" + } + ] + } +}