diff --git a/2018/10xxx/CVE-2018-10243.json b/2018/10xxx/CVE-2018-10243.json index ecefa2bc5ed..f041852dc28 100644 --- a/2018/10xxx/CVE-2018-10243.json +++ b/2018/10xxx/CVE-2018-10243.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-10243", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "htp_parse_authorization_digest in htp_parsers.c in LibHTP 0.5.26 allows remote attackers to cause a heap-based buffer over-read via an authorization digest header." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://suricata-ids.org/2018/07/18/suricata-4-0-5-available/", + "url": "https://suricata-ids.org/2018/07/18/suricata-4-0-5-available/" } ] } diff --git a/2018/10xxx/CVE-2018-10244.json b/2018/10xxx/CVE-2018-10244.json index 28da81f6f4b..4dc9711cf3b 100644 --- a/2018/10xxx/CVE-2018-10244.json +++ b/2018/10xxx/CVE-2018-10244.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-10244", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Suricata version 4.0.4 incorrectly handles the parsing of an EtherNet/IP PDU. A malformed PDU can cause the parsing code to read beyond the allocated data because DecodeENIPPDU in app-layer-enip-commmon.c has an integer overflow during a length check." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://suricata-ids.org/2018/07/18/suricata-4-0-5-available/", + "url": "https://suricata-ids.org/2018/07/18/suricata-4-0-5-available/" } ] } diff --git a/2018/11xxx/CVE-2018-11830.json b/2018/11xxx/CVE-2018-11830.json index 8c59d849dbe..911595d8cd7 100644 --- a/2018/11xxx/CVE-2018-11830.json +++ b/2018/11xxx/CVE-2018-11830.json @@ -1,62 +1,62 @@ { - "CVE_data_meta": { - "ASSIGNER": "product-security@qualcomm.com", - "ID": "CVE-2018-11830", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile", - "version": { - "version_data": [ - { - "version_value": "MDM9206, MDM9607, MDM9650, MDM9655, MSM8996AU, SD 410/12, SD 820A" - } - ] - } - } - ] - }, - "vendor_name": "Qualcomm, Inc." - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Improper input validation in QCPE create function may lead to integer overflow in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9206, MDM9607, MDM9650, MDM9655, MSM8996AU, SD 410/12, SD 820A" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Improper Input Validation vulnerability in QCPE" - } + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2018-11830", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile", + "version": { + "version_data": [ + { + "version_value": "MDM9206, MDM9607, MDM9650, MDM9655, MSM8996AU, SD 410/12, SD 820A" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://www.qualcomm.com/company/product-security/bulletins", - "refsource": "CONFIRM", - "url": "https://www.qualcomm.com/company/product-security/bulletins" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Improper input validation in QCPE create function may lead to integer overflow in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9206, MDM9607, MDM9650, MDM9655, MSM8996AU, SD 410/12, SD 820A" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation vulnerability in QCPE" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins" + } + ] + } +} \ No newline at end of file diff --git a/2018/11xxx/CVE-2018-11958.json b/2018/11xxx/CVE-2018-11958.json index 57b45132f94..e13fe118e3b 100644 --- a/2018/11xxx/CVE-2018-11958.json +++ b/2018/11xxx/CVE-2018-11958.json @@ -1,62 +1,62 @@ { - "CVE_data_meta": { - "ASSIGNER": "product-security@qualcomm.com", - "ID": "CVE-2018-11958", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music", - "version": { - "version_data": [ - { - "version_value": "MDM9206, MDM9607, MDM9650, MDM9655, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016" - } - ] - } - } - ] - }, - "vendor_name": "Qualcomm, Inc." - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Insufficient protection of keys in keypad can lead HLOS to gain access to confidential keypad input data in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9206, MDM9607, MDM9650, MDM9655, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Improper Access Control vulnerability in Content Protection" - } + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2018-11958", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music", + "version": { + "version_data": [ + { + "version_value": "MDM9206, MDM9607, MDM9650, MDM9655, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://www.qualcomm.com/company/product-security/bulletins", - "refsource": "CONFIRM", - "url": "https://www.qualcomm.com/company/product-security/bulletins" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Insufficient protection of keys in keypad can lead HLOS to gain access to confidential keypad input data in Snapdragon Auto, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Voice & Music in MDM9206, MDM9607, MDM9650, MDM9655, Qualcomm 215, SD 210/SD 212/SD 205, SD 410/12, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 615/16/SD 415, SD 625, SD 632, SD 636, SD 650/52, SDA660, SDM439, SDM630, SDM660, Snapdragon_High_Med_2016" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control vulnerability in Content Protection" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins" + } + ] + } +} \ No newline at end of file diff --git a/2018/11xxx/CVE-2018-11966.json b/2018/11xxx/CVE-2018-11966.json index 54cd4ef7634..3bb0d940fb1 100644 --- a/2018/11xxx/CVE-2018-11966.json +++ b/2018/11xxx/CVE-2018-11966.json @@ -1,62 +1,62 @@ { - "CVE_data_meta": { - "ASSIGNER": "product-security@qualcomm.com", - "ID": "CVE-2018-11966", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables", - "version": { - "version_data": [ - { - "version_value": "MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SM7150, Snapdragon_High_Med_2016, SXR1130" - } - ] - } - } - ] - }, - "vendor_name": "Qualcomm, Inc." - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Undefined behavior in UE while processing unknown IEI in OTA message in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SM7150, Snapdragon_High_Med_2016, SXR1130" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Improper Input Validation in NAS" - } + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2018-11966", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables", + "version": { + "version_data": [ + { + "version_value": "MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SM7150, Snapdragon_High_Med_2016, SXR1130" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://www.qualcomm.com/company/product-security/bulletins", - "refsource": "CONFIRM", - "url": "https://www.qualcomm.com/company/product-security/bulletins" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Undefined behavior in UE while processing unknown IEI in OTA message in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables in MDM9150, MDM9206, MDM9607, MDM9640, MDM9650, MDM9655, MSM8909W, MSM8996AU, QCS605, SD 210/SD 212/SD 205, SD 425, SD 427, SD 430, SD 435, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 636, SD 650/52, SD 675, SD 712 / SD 710 / SD 670, SD 820, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDA660, SDM439, SDM630, SDM660, SDX20, SM7150, Snapdragon_High_Med_2016, SXR1130" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Input Validation in NAS" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins" + } + ] + } +} \ No newline at end of file diff --git a/2018/11xxx/CVE-2018-11970.json b/2018/11xxx/CVE-2018-11970.json index 93cfed105ca..c80008b85bd 100644 --- a/2018/11xxx/CVE-2018-11970.json +++ b/2018/11xxx/CVE-2018-11970.json @@ -1,62 +1,62 @@ { - "CVE_data_meta": { - "ASSIGNER": "product-security@qualcomm.com", - "ID": "CVE-2018-11970", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile", - "version": { - "version_data": [ - { - "version_value": "MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 410/12, SD 636, SD 712 / SD 710 / SD 670, SD 845 / SD 850, SD 8CX, SDA660, SDM630, SDM660, SXR1130" - } - ] - } - } - ] - }, - "vendor_name": "Qualcomm, Inc." - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "TZ App dynamic allocations not protected from XBL loader in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 410/12, SD 636, SD 712 / SD 710 / SD 670, SD 845 / SD 850, SD 8CX, SDA660, SDM630, SDM660, SXR1130" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Permissions, Privilege and Access Controls vulnerability in QTEE" - } + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2018-11970", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile", + "version": { + "version_data": [ + { + "version_value": "MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 410/12, SD 636, SD 712 / SD 710 / SD 670, SD 845 / SD 850, SD 8CX, SDA660, SDM630, SDM660, SXR1130" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://www.qualcomm.com/company/product-security/bulletins", - "refsource": "CONFIRM", - "url": "https://www.qualcomm.com/company/product-security/bulletins" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "TZ App dynamic allocations not protected from XBL loader in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile in MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 410/12, SD 636, SD 712 / SD 710 / SD 670, SD 845 / SD 850, SD 8CX, SDA660, SDM630, SDM660, SXR1130" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Permissions, Privilege and Access Controls vulnerability in QTEE" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins" + } + ] + } +} \ No newline at end of file diff --git a/2018/11xxx/CVE-2018-11971.json b/2018/11xxx/CVE-2018-11971.json index 5878b863d56..4a258f8e6fb 100644 --- a/2018/11xxx/CVE-2018-11971.json +++ b/2018/11xxx/CVE-2018-11971.json @@ -1,62 +1,62 @@ { - "CVE_data_meta": { - "ASSIGNER": "product-security@qualcomm.com", - "ID": "CVE-2018-11971", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile,", - "version": { - "version_data": [ - { - "version_value": "MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 410/12, SD 615/16/SD 415, SD 636, SD 712 / SD 710 / SD 670, SD 845 / SD 850, SD 8CX, SDA660, SDM630, SDM660, SXR1130" - } - ] - } - } - ] - }, - "vendor_name": "Qualcomm, Inc." - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Interrupt exit code flow may undermine access control policy set forth by secure world can lead to potential secure asset leakage in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, in MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 410/12, SD 615/16/SD 415, SD 636, SD 712 / SD 710 / SD 670, SD 845 / SD 850, SD 8CX, SDA660, SDM630, SDM660, SXR1130" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Information Exposure vulnerability in TrustZone" - } + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2018-11971", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile,", + "version": { + "version_data": [ + { + "version_value": "MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 410/12, SD 615/16/SD 415, SD 636, SD 712 / SD 710 / SD 670, SD 845 / SD 850, SD 8CX, SDA660, SDM630, SDM660, SXR1130" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://www.qualcomm.com/company/product-security/bulletins", - "refsource": "CONFIRM", - "url": "https://www.qualcomm.com/company/product-security/bulletins" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Interrupt exit code flow may undermine access control policy set forth by secure world can lead to potential secure asset leakage in Snapdragon Auto, Snapdragon Compute, Snapdragon Consumer Electronics Connectivity, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, in MDM9206, MDM9607, MDM9650, MDM9655, QCS605, SD 410/12, SD 615/16/SD 415, SD 636, SD 712 / SD 710 / SD 670, SD 845 / SD 850, SD 8CX, SDA660, SDM630, SDM660, SXR1130" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Information Exposure vulnerability in TrustZone" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins" + } + ] + } +} \ No newline at end of file diff --git a/2018/13xxx/CVE-2018-13918.json b/2018/13xxx/CVE-2018-13918.json index f0314c2fcd8..68f35f4f295 100644 --- a/2018/13xxx/CVE-2018-13918.json +++ b/2018/13xxx/CVE-2018-13918.json @@ -1,62 +1,62 @@ { - "CVE_data_meta": { - "ASSIGNER": "product-security@qualcomm.com", - "ID": "CVE-2018-13918", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables,", - "version": { - "version_data": [ - { - "version_value": "MDM9150, MDM9206, MDM9607, MDM9650, MSM8909W, QCS605, Qualcomm 215, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 675, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDM439, SDX24, SM7150" - } - ] - } - } - ] - }, - "vendor_name": "Qualcomm, Inc." - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "kernel could return a received message length higher than expected, which leads to buffer overflow in a subsequent operation and stops normal operation in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, in MDM9150, MDM9206, MDM9607, MDM9650, MSM8909W, QCS605, Qualcomm 215, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 675, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDM439, SDX24, SM7150" - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Buffer Copy Without Checking Size of Input vulnerability in PMIC Modules" - } + "CVE_data_meta": { + "ASSIGNER": "product-security@qualcomm.com", + "ID": "CVE-2018-13918", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables,", + "version": { + "version_data": [ + { + "version_value": "MDM9150, MDM9206, MDM9607, MDM9650, MSM8909W, QCS605, Qualcomm 215, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 675, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDM439, SDX24, SM7150" + } + ] + } + } + ] + }, + "vendor_name": "Qualcomm, Inc." + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://www.qualcomm.com/company/product-security/bulletins", - "refsource": "CONFIRM", - "url": "https://www.qualcomm.com/company/product-security/bulletins" - } - ] - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "kernel could return a received message length higher than expected, which leads to buffer overflow in a subsequent operation and stops normal operation in Snapdragon Auto, Snapdragon Consumer IOT, Snapdragon Industrial IOT, Snapdragon Mobile, Snapdragon Wearables, in MDM9150, MDM9206, MDM9607, MDM9650, MSM8909W, QCS605, Qualcomm 215, SD 425, SD 439 / SD 429, SD 450, SD 625, SD 632, SD 675, SD 712 / SD 710 / SD 670, SD 820A, SD 835, SD 845 / SD 850, SD 855, SDM439, SDX24, SM7150" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Buffer Copy Without Checking Size of Input vulnerability in PMIC Modules" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://www.qualcomm.com/company/product-security/bulletins", + "refsource": "CONFIRM", + "url": "https://www.qualcomm.com/company/product-security/bulletins" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20222.json b/2018/20xxx/CVE-2018-20222.json index 249421b5605..953479c3d61 100644 --- a/2018/20xxx/CVE-2018-20222.json +++ b/2018/20xxx/CVE-2018-20222.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20222", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "XXE issue in Airsonic before 10.1.2 during parse." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://github.com/airsonic/airsonic/blob/master/CHANGELOG.md", + "url": "https://github.com/airsonic/airsonic/blob/master/CHANGELOG.md" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/airsonic/airsonic/releases/tag/v10.2.1", + "url": "https://github.com/airsonic/airsonic/releases/tag/v10.2.1" } ] } diff --git a/2018/20xxx/CVE-2018-20449.json b/2018/20xxx/CVE-2018-20449.json index 53aea3b255e..30c13a5b9e6 100644 --- a/2018/20xxx/CVE-2018-20449.json +++ b/2018/20xxx/CVE-2018-20449.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-20449", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The hidma_chan_stats function in drivers/dma/qcom/hidma_dbg.c in the Linux kernel 4.14.90 allows local users to obtain sensitive address information by reading \"callback=\" lines in a debugfs file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://elixir.bootlin.com/linux/v4.14.90/source/drivers/dma/qcom/hidma_dbg.c#L92", + "url": "https://elixir.bootlin.com/linux/v4.14.90/source/drivers/dma/qcom/hidma_dbg.c#L92" + }, + { + "refsource": "MISC", + "name": "https://www.mail-archive.com/debian-security-tracker@lists.debian.org/msg03808.html", + "url": "https://www.mail-archive.com/debian-security-tracker@lists.debian.org/msg03808.html" } ] } diff --git a/2019/1003xxx/CVE-2019-1003051.json b/2019/1003xxx/CVE-2019-1003051.json index ecc51f4a8b1..42c72fa7b04 100644 --- a/2019/1003xxx/CVE-2019-1003051.json +++ b/2019/1003xxx/CVE-2019-1003051.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003051", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-829" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-829", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-829" } ] } diff --git a/2019/1003xxx/CVE-2019-1003052.json b/2019/1003xxx/CVE-2019-1003052.json index de049c42274..63fe7ec434b 100644 --- a/2019/1003xxx/CVE-2019-1003052.json +++ b/2019/1003xxx/CVE-2019-1003052.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003052", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-831" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-831", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-831" } ] } diff --git a/2019/1003xxx/CVE-2019-1003053.json b/2019/1003xxx/CVE-2019-1003053.json index 92168776605..f494f989b7d 100644 --- a/2019/1003xxx/CVE-2019-1003053.json +++ b/2019/1003xxx/CVE-2019-1003053.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003053", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-839" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-839", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-839" } ] } diff --git a/2019/1003xxx/CVE-2019-1003054.json b/2019/1003xxx/CVE-2019-1003054.json index 3e810353fbb..aba2af88453 100644 --- a/2019/1003xxx/CVE-2019-1003054.json +++ b/2019/1003xxx/CVE-2019-1003054.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003054", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-837" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-837", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-837" } ] } diff --git a/2019/1003xxx/CVE-2019-1003055.json b/2019/1003xxx/CVE-2019-1003055.json index 4654a48bb6c..cf1c7b4dacd 100644 --- a/2019/1003xxx/CVE-2019-1003055.json +++ b/2019/1003xxx/CVE-2019-1003055.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003055", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-954" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-954", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-954" } ] } diff --git a/2019/1003xxx/CVE-2019-1003056.json b/2019/1003xxx/CVE-2019-1003056.json index a7274c5a1ba..d4dcf617637 100644 --- a/2019/1003xxx/CVE-2019-1003056.json +++ b/2019/1003xxx/CVE-2019-1003056.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003056", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-956" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-956", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-956" } ] } diff --git a/2019/1003xxx/CVE-2019-1003057.json b/2019/1003xxx/CVE-2019-1003057.json index a7d0c58ebf6..0a040647c5b 100644 --- a/2019/1003xxx/CVE-2019-1003057.json +++ b/2019/1003xxx/CVE-2019-1003057.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003057", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-965" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-965", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-965" } ] } diff --git a/2019/1003xxx/CVE-2019-1003058.json b/2019/1003xxx/CVE-2019-1003058.json index c092b129dba..5f7a4827308 100644 --- a/2019/1003xxx/CVE-2019-1003058.json +++ b/2019/1003xxx/CVE-2019-1003058.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003058", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-974" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-974", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-974" } ] } diff --git a/2019/1003xxx/CVE-2019-1003059.json b/2019/1003xxx/CVE-2019-1003059.json index 692eea660f5..755e82171b4 100644 --- a/2019/1003xxx/CVE-2019-1003059.json +++ b/2019/1003xxx/CVE-2019-1003059.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003059", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-974" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-974", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-974" } ] } diff --git a/2019/1003xxx/CVE-2019-1003060.json b/2019/1003xxx/CVE-2019-1003060.json index 8fbcbcc8736..3665691cbdf 100644 --- a/2019/1003xxx/CVE-2019-1003060.json +++ b/2019/1003xxx/CVE-2019-1003060.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003060", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1041" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1041", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1041" } ] } diff --git a/2019/1003xxx/CVE-2019-1003061.json b/2019/1003xxx/CVE-2019-1003061.json index e110b2fc914..2f9b9c59332 100644 --- a/2019/1003xxx/CVE-2019-1003061.json +++ b/2019/1003xxx/CVE-2019-1003061.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003061", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1042" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1042", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1042" } ] } diff --git a/2019/1003xxx/CVE-2019-1003062.json b/2019/1003xxx/CVE-2019-1003062.json index 3c9125d4ae8..766cf2920b4 100644 --- a/2019/1003xxx/CVE-2019-1003062.json +++ b/2019/1003xxx/CVE-2019-1003062.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003062", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-830" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-830", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-830" } ] } diff --git a/2019/1003xxx/CVE-2019-1003063.json b/2019/1003xxx/CVE-2019-1003063.json index b7f4fed59f6..a8913ed2df6 100644 --- a/2019/1003xxx/CVE-2019-1003063.json +++ b/2019/1003xxx/CVE-2019-1003063.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003063", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-832" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-832", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-832" } ] } diff --git a/2019/1003xxx/CVE-2019-1003064.json b/2019/1003xxx/CVE-2019-1003064.json index 9d5855f39d7..ede8e4e2676 100644 --- a/2019/1003xxx/CVE-2019-1003064.json +++ b/2019/1003xxx/CVE-2019-1003064.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003064", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-835" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-835", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-835" } ] } diff --git a/2019/1003xxx/CVE-2019-1003065.json b/2019/1003xxx/CVE-2019-1003065.json index 095dfd0d400..2a75326e030 100644 --- a/2019/1003xxx/CVE-2019-1003065.json +++ b/2019/1003xxx/CVE-2019-1003065.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003065", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-838" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-838", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-838" } ] } diff --git a/2019/1003xxx/CVE-2019-1003066.json b/2019/1003xxx/CVE-2019-1003066.json index bf582465cc4..9540da4536a 100644 --- a/2019/1003xxx/CVE-2019-1003066.json +++ b/2019/1003xxx/CVE-2019-1003066.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003066", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-841" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-841", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-841" } ] } diff --git a/2019/1003xxx/CVE-2019-1003067.json b/2019/1003xxx/CVE-2019-1003067.json index 852ee63cd63..f7a0d0f03c1 100644 --- a/2019/1003xxx/CVE-2019-1003067.json +++ b/2019/1003xxx/CVE-2019-1003067.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003067", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-842" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-842", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-842" } ] } diff --git a/2019/1003xxx/CVE-2019-1003068.json b/2019/1003xxx/CVE-2019-1003068.json index ca1542c0ff6..867190edfde 100644 --- a/2019/1003xxx/CVE-2019-1003068.json +++ b/2019/1003xxx/CVE-2019-1003068.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003068", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-945" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-945", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-945" } ] } diff --git a/2019/1003xxx/CVE-2019-1003069.json b/2019/1003xxx/CVE-2019-1003069.json index 73bbe5e2b80..87a20e276ce 100644 --- a/2019/1003xxx/CVE-2019-1003069.json +++ b/2019/1003xxx/CVE-2019-1003069.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003069", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-949" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-949", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-949" } ] } diff --git a/2019/1003xxx/CVE-2019-1003070.json b/2019/1003xxx/CVE-2019-1003070.json index a4db2adbfb0..2ee33003f6e 100644 --- a/2019/1003xxx/CVE-2019-1003070.json +++ b/2019/1003xxx/CVE-2019-1003070.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003070", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-952" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-952", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-952" } ] } diff --git a/2019/1003xxx/CVE-2019-1003071.json b/2019/1003xxx/CVE-2019-1003071.json index 7e93060a435..e28c9329375 100644 --- a/2019/1003xxx/CVE-2019-1003071.json +++ b/2019/1003xxx/CVE-2019-1003071.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003071", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-957" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-957", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-957" } ] } diff --git a/2019/1003xxx/CVE-2019-1003072.json b/2019/1003xxx/CVE-2019-1003072.json index 469be109bc9..7df109f05dc 100644 --- a/2019/1003xxx/CVE-2019-1003072.json +++ b/2019/1003xxx/CVE-2019-1003072.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003072", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-961" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-961", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-961" } ] } diff --git a/2019/1003xxx/CVE-2019-1003073.json b/2019/1003xxx/CVE-2019-1003073.json index 4a1a1076534..89aac9d60c1 100644 --- a/2019/1003xxx/CVE-2019-1003073.json +++ b/2019/1003xxx/CVE-2019-1003073.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003073", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-962" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-962", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-962" } ] } diff --git a/2019/1003xxx/CVE-2019-1003074.json b/2019/1003xxx/CVE-2019-1003074.json index ea263c93b8e..c00a0b0ddd8 100644 --- a/2019/1003xxx/CVE-2019-1003074.json +++ b/2019/1003xxx/CVE-2019-1003074.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003074", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-964" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-964", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-964" } ] } diff --git a/2019/1003xxx/CVE-2019-1003075.json b/2019/1003xxx/CVE-2019-1003075.json index cebcc13023e..a1df0889258 100644 --- a/2019/1003xxx/CVE-2019-1003075.json +++ b/2019/1003xxx/CVE-2019-1003075.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003075", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-966" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-966", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-966" } ] } diff --git a/2019/1003xxx/CVE-2019-1003076.json b/2019/1003xxx/CVE-2019-1003076.json index fd3248d1b06..34d22ec9ac9 100644 --- a/2019/1003xxx/CVE-2019-1003076.json +++ b/2019/1003xxx/CVE-2019-1003076.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003076", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-977" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-977", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-977" } ] } diff --git a/2019/1003xxx/CVE-2019-1003077.json b/2019/1003xxx/CVE-2019-1003077.json index 0b88de93492..8332e3ed5e3 100644 --- a/2019/1003xxx/CVE-2019-1003077.json +++ b/2019/1003xxx/CVE-2019-1003077.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003077", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-977" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-977", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-977" } ] } diff --git a/2019/1003xxx/CVE-2019-1003078.json b/2019/1003xxx/CVE-2019-1003078.json index 49be31069c2..ecbd2c8f9e1 100644 --- a/2019/1003xxx/CVE-2019-1003078.json +++ b/2019/1003xxx/CVE-2019-1003078.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003078", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-979" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-979", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-979" } ] } diff --git a/2019/1003xxx/CVE-2019-1003079.json b/2019/1003xxx/CVE-2019-1003079.json index dca69306fc1..d3d2fbb8a20 100644 --- a/2019/1003xxx/CVE-2019-1003079.json +++ b/2019/1003xxx/CVE-2019-1003079.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003079", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-979" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-979", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-979" } ] } diff --git a/2019/1003xxx/CVE-2019-1003080.json b/2019/1003xxx/CVE-2019-1003080.json index 2173c3f65fb..934cfeec0aa 100644 --- a/2019/1003xxx/CVE-2019-1003080.json +++ b/2019/1003xxx/CVE-2019-1003080.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003080", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-981" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-981", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-981" } ] } diff --git a/2019/1003xxx/CVE-2019-1003081.json b/2019/1003xxx/CVE-2019-1003081.json index 8f8d29d0e25..e21cf362b9f 100644 --- a/2019/1003xxx/CVE-2019-1003081.json +++ b/2019/1003xxx/CVE-2019-1003081.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003081", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-981" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-981", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-981" } ] } diff --git a/2019/1003xxx/CVE-2019-1003082.json b/2019/1003xxx/CVE-2019-1003082.json index 5d4dfa26e27..351e29e465f 100644 --- a/2019/1003xxx/CVE-2019-1003082.json +++ b/2019/1003xxx/CVE-2019-1003082.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003082", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-991" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-991", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-991" } ] } diff --git a/2019/1003xxx/CVE-2019-1003083.json b/2019/1003xxx/CVE-2019-1003083.json index eadfb4a5814..1b243e4c6ad 100644 --- a/2019/1003xxx/CVE-2019-1003083.json +++ b/2019/1003xxx/CVE-2019-1003083.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003083", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-991" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-991", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-991" } ] } diff --git a/2019/1003xxx/CVE-2019-1003084.json b/2019/1003xxx/CVE-2019-1003084.json index ed7a88ea2a0..46bb6af12da 100644 --- a/2019/1003xxx/CVE-2019-1003084.json +++ b/2019/1003xxx/CVE-2019-1003084.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003084", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-993" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-993", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-993" } ] } diff --git a/2019/1003xxx/CVE-2019-1003085.json b/2019/1003xxx/CVE-2019-1003085.json index 5d076a18636..e109b2fbcd7 100644 --- a/2019/1003xxx/CVE-2019-1003085.json +++ b/2019/1003xxx/CVE-2019-1003085.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003085", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-993" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-993", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-993" } ] } diff --git a/2019/1003xxx/CVE-2019-1003086.json b/2019/1003xxx/CVE-2019-1003086.json index e6db35a7d59..0d0007e0545 100644 --- a/2019/1003xxx/CVE-2019-1003086.json +++ b/2019/1003xxx/CVE-2019-1003086.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003086", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1037" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1037", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1037" } ] } diff --git a/2019/1003xxx/CVE-2019-1003087.json b/2019/1003xxx/CVE-2019-1003087.json index a105ee12f4e..a55f85b0487 100644 --- a/2019/1003xxx/CVE-2019-1003087.json +++ b/2019/1003xxx/CVE-2019-1003087.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003087", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1037" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1037", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1037" } ] } diff --git a/2019/1003xxx/CVE-2019-1003088.json b/2019/1003xxx/CVE-2019-1003088.json index b39a89ab614..eced7140fb4 100644 --- a/2019/1003xxx/CVE-2019-1003088.json +++ b/2019/1003xxx/CVE-2019-1003088.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003088", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1043" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1043", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1043" } ] } diff --git a/2019/1003xxx/CVE-2019-1003089.json b/2019/1003xxx/CVE-2019-1003089.json index 82a7528d854..d124bfb7a46 100644 --- a/2019/1003xxx/CVE-2019-1003089.json +++ b/2019/1003xxx/CVE-2019-1003089.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003089", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1044" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1044", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1044" } ] } diff --git a/2019/1003xxx/CVE-2019-1003090.json b/2019/1003xxx/CVE-2019-1003090.json index 26f3977b10f..b77babf1512 100644 --- a/2019/1003xxx/CVE-2019-1003090.json +++ b/2019/1003xxx/CVE-2019-1003090.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003090", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1054" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1054", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1054" } ] } diff --git a/2019/1003xxx/CVE-2019-1003091.json b/2019/1003xxx/CVE-2019-1003091.json index b41d8b1b7ba..f0b94a0d17c 100644 --- a/2019/1003xxx/CVE-2019-1003091.json +++ b/2019/1003xxx/CVE-2019-1003091.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003091", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1054" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1054", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1054" } ] } diff --git a/2019/1003xxx/CVE-2019-1003092.json b/2019/1003xxx/CVE-2019-1003092.json index 312a89b3038..0ea5ee8dead 100644 --- a/2019/1003xxx/CVE-2019-1003092.json +++ b/2019/1003xxx/CVE-2019-1003092.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003092", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1058" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1058", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1058" } ] } diff --git a/2019/1003xxx/CVE-2019-1003093.json b/2019/1003xxx/CVE-2019-1003093.json index b18f1cc1013..65519aabb52 100644 --- a/2019/1003xxx/CVE-2019-1003093.json +++ b/2019/1003xxx/CVE-2019-1003093.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003093", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1058" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1058", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1058" } ] } diff --git a/2019/1003xxx/CVE-2019-1003094.json b/2019/1003xxx/CVE-2019-1003094.json index e49d2d05914..4ee341f21c1 100644 --- a/2019/1003xxx/CVE-2019-1003094.json +++ b/2019/1003xxx/CVE-2019-1003094.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003094", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1059" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1059", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1059" } ] } diff --git a/2019/1003xxx/CVE-2019-1003095.json b/2019/1003xxx/CVE-2019-1003095.json index 098a0410e24..c8ba5e57655 100644 --- a/2019/1003xxx/CVE-2019-1003095.json +++ b/2019/1003xxx/CVE-2019-1003095.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003095", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1061" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1061", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1061" } ] } diff --git a/2019/1003xxx/CVE-2019-1003096.json b/2019/1003xxx/CVE-2019-1003096.json index 42bba0a3706..33e7c5ca03f 100644 --- a/2019/1003xxx/CVE-2019-1003096.json +++ b/2019/1003xxx/CVE-2019-1003096.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003096", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1062" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1062", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1062" } ] } diff --git a/2019/1003xxx/CVE-2019-1003097.json b/2019/1003xxx/CVE-2019-1003097.json index 98c91f43af1..e89db735bf0 100644 --- a/2019/1003xxx/CVE-2019-1003097.json +++ b/2019/1003xxx/CVE-2019-1003097.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003097", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1069" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1069", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1069" } ] } diff --git a/2019/1003xxx/CVE-2019-1003098.json b/2019/1003xxx/CVE-2019-1003098.json index ce71da88658..86a1eed7a25 100644 --- a/2019/1003xxx/CVE-2019-1003098.json +++ b/2019/1003xxx/CVE-2019-1003098.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003098", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1084" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1084", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1084" } ] } diff --git a/2019/1003xxx/CVE-2019-1003099.json b/2019/1003xxx/CVE-2019-1003099.json index ce6e3f0ef71..8d4b1aab20c 100644 --- a/2019/1003xxx/CVE-2019-1003099.json +++ b/2019/1003xxx/CVE-2019-1003099.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-1003099", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1084" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1084", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1084" } ] } diff --git a/2019/10xxx/CVE-2019-10273.json b/2019/10xxx/CVE-2019-10273.json index 669d8bc75c7..af88db38aca 100644 --- a/2019/10xxx/CVE-2019-10273.json +++ b/2019/10xxx/CVE-2019-10273.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-10273", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-10273", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Information leakage vulnerability in the /mc login page in ManageEngine ServiceDesk Plus 9.3 software allows authenticated users to enumerate active users. Due to a flaw within the way the authentication is handled, an attacker is able to login and verify any active account." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://0x445.github.io/CVE-2019-10273/", + "url": "https://0x445.github.io/CVE-2019-10273/" } ] } diff --git a/2019/10xxx/CVE-2019-10277.json b/2019/10xxx/CVE-2019-10277.json index 97071f5f515..112ff6a3e90 100644 --- a/2019/10xxx/CVE-2019-10277.json +++ b/2019/10xxx/CVE-2019-10277.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10277", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1085" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1085", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1085" } ] } diff --git a/2019/10xxx/CVE-2019-10278.json b/2019/10xxx/CVE-2019-10278.json index b95217e1fa1..e52fab7ff3d 100644 --- a/2019/10xxx/CVE-2019-10278.json +++ b/2019/10xxx/CVE-2019-10278.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10278", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1091" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1091", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1091" } ] } diff --git a/2019/10xxx/CVE-2019-10279.json b/2019/10xxx/CVE-2019-10279.json index 0ac1497f271..10ad95a9ddf 100644 --- a/2019/10xxx/CVE-2019-10279.json +++ b/2019/10xxx/CVE-2019-10279.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10279", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1091" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1091", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1091" } ] } diff --git a/2019/10xxx/CVE-2019-10280.json b/2019/10xxx/CVE-2019-10280.json index 2e3f6353cd6..d7a6a4b4513 100644 --- a/2019/10xxx/CVE-2019-10280.json +++ b/2019/10xxx/CVE-2019-10280.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10280", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1093" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1093", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1093" } ] } diff --git a/2019/10xxx/CVE-2019-10281.json b/2019/10xxx/CVE-2019-10281.json index a7351b24c76..47d97517799 100644 --- a/2019/10xxx/CVE-2019-10281.json +++ b/2019/10xxx/CVE-2019-10281.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10281", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-828" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-828", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-828" } ] } diff --git a/2019/10xxx/CVE-2019-10282.json b/2019/10xxx/CVE-2019-10282.json index e47f3c4f92d..048614cf7f0 100644 --- a/2019/10xxx/CVE-2019-10282.json +++ b/2019/10xxx/CVE-2019-10282.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10282", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-843" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-843", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-843" } ] } diff --git a/2019/10xxx/CVE-2019-10283.json b/2019/10xxx/CVE-2019-10283.json index 086ad92b6ef..dcc5b0eb412 100644 --- a/2019/10xxx/CVE-2019-10283.json +++ b/2019/10xxx/CVE-2019-10283.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10283", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-946" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-946", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-946" } ] } diff --git a/2019/10xxx/CVE-2019-10284.json b/2019/10xxx/CVE-2019-10284.json index 50a5bbd4766..300a7e62bd7 100644 --- a/2019/10xxx/CVE-2019-10284.json +++ b/2019/10xxx/CVE-2019-10284.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10284", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-947" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-947", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-947" } ] } diff --git a/2019/10xxx/CVE-2019-10285.json b/2019/10xxx/CVE-2019-10285.json index 18634fa65f2..a66925dc94f 100644 --- a/2019/10xxx/CVE-2019-10285.json +++ b/2019/10xxx/CVE-2019-10285.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10285", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-955" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-955", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-955" } ] } diff --git a/2019/10xxx/CVE-2019-10286.json b/2019/10xxx/CVE-2019-10286.json index 9963df1c13f..159e10aabd5 100644 --- a/2019/10xxx/CVE-2019-10286.json +++ b/2019/10xxx/CVE-2019-10286.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10286", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-959" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-959", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-959" } ] } diff --git a/2019/10xxx/CVE-2019-10287.json b/2019/10xxx/CVE-2019-10287.json index 90fe70b9287..77231735d1c 100644 --- a/2019/10xxx/CVE-2019-10287.json +++ b/2019/10xxx/CVE-2019-10287.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10287", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-963" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-963", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-963" } ] } diff --git a/2019/10xxx/CVE-2019-10288.json b/2019/10xxx/CVE-2019-10288.json index 315ddea3f3d..43f6480f695 100644 --- a/2019/10xxx/CVE-2019-10288.json +++ b/2019/10xxx/CVE-2019-10288.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10288", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1031" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1031", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1031" } ] } diff --git a/2019/10xxx/CVE-2019-10289.json b/2019/10xxx/CVE-2019-10289.json index e41d2a123e7..26c36aba304 100644 --- a/2019/10xxx/CVE-2019-10289.json +++ b/2019/10xxx/CVE-2019-10289.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10289", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1032" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1032", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1032" } ] } diff --git a/2019/10xxx/CVE-2019-10290.json b/2019/10xxx/CVE-2019-10290.json index ba3e9f6d82d..5af4bdbda52 100644 --- a/2019/10xxx/CVE-2019-10290.json +++ b/2019/10xxx/CVE-2019-10290.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10290", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1032" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1032", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1032" } ] } diff --git a/2019/10xxx/CVE-2019-10291.json b/2019/10xxx/CVE-2019-10291.json index e3fbb4e3417..dc813c43a4f 100644 --- a/2019/10xxx/CVE-2019-10291.json +++ b/2019/10xxx/CVE-2019-10291.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10291", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1040" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1040", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1040" } ] } diff --git a/2019/10xxx/CVE-2019-10292.json b/2019/10xxx/CVE-2019-10292.json index 672d692d218..e0c97db6894 100644 --- a/2019/10xxx/CVE-2019-10292.json +++ b/2019/10xxx/CVE-2019-10292.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10292", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1055" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1055", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1055" } ] } diff --git a/2019/10xxx/CVE-2019-10293.json b/2019/10xxx/CVE-2019-10293.json index b36680b3fb1..8f0f8be0d55 100644 --- a/2019/10xxx/CVE-2019-10293.json +++ b/2019/10xxx/CVE-2019-10293.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10293", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1055" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1055", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1055" } ] } diff --git a/2019/10xxx/CVE-2019-10294.json b/2019/10xxx/CVE-2019-10294.json index cc1b252ece4..27d33080a44 100644 --- a/2019/10xxx/CVE-2019-10294.json +++ b/2019/10xxx/CVE-2019-10294.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10294", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1056" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1056", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1056" } ] } diff --git a/2019/10xxx/CVE-2019-10295.json b/2019/10xxx/CVE-2019-10295.json index 0df32d42209..72ab2cb1f0f 100644 --- a/2019/10xxx/CVE-2019-10295.json +++ b/2019/10xxx/CVE-2019-10295.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10295", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1063" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1063", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1063" } ] } diff --git a/2019/10xxx/CVE-2019-10296.json b/2019/10xxx/CVE-2019-10296.json index aff9590a789..35582b8d07f 100644 --- a/2019/10xxx/CVE-2019-10296.json +++ b/2019/10xxx/CVE-2019-10296.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10296", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1066" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1066", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1066" } ] } diff --git a/2019/10xxx/CVE-2019-10297.json b/2019/10xxx/CVE-2019-10297.json index 082bc07cb4d..9c3b0b09d3b 100644 --- a/2019/10xxx/CVE-2019-10297.json +++ b/2019/10xxx/CVE-2019-10297.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10297", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1090" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1090", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1090" } ] } diff --git a/2019/10xxx/CVE-2019-10298.json b/2019/10xxx/CVE-2019-10298.json index a50cd35055e..3459bfc1792 100644 --- a/2019/10xxx/CVE-2019-10298.json +++ b/2019/10xxx/CVE-2019-10298.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10298", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1092" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1092", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-1092" } ] } diff --git a/2019/10xxx/CVE-2019-10299.json b/2019/10xxx/CVE-2019-10299.json index 79da32f0763..16c2cc99dc3 100644 --- a/2019/10xxx/CVE-2019-10299.json +++ b/2019/10xxx/CVE-2019-10299.json @@ -1,7 +1,8 @@ { "CVE_data_meta": { "ID": "CVE-2019-10299", - "ASSIGNER": "jenkinsci-cert@googlegroups.com" + "ASSIGNER": "jenkinsci-cert@googlegroups.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -52,7 +53,9 @@ "references": { "reference_data": [ { - "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-960" + "url": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-960", + "refsource": "MISC", + "name": "https://jenkins.io/security/advisory/2019-04-03/#SECURITY-960" } ] } diff --git a/2019/10xxx/CVE-2019-10856.json b/2019/10xxx/CVE-2019-10856.json new file mode 100644 index 00000000000..4d641b6e6d9 --- /dev/null +++ b/2019/10xxx/CVE-2019-10856.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-10856", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Jupyter Notebook before 5.7.8, an open redirect can occur via an empty netloc. This issue exists because of an incomplete fix for CVE-2019-10255." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://blog.jupyter.org/open-redirect-vulnerability-in-jupyter-jupyterhub-adf43583f1e4", + "refsource": "MISC", + "name": "https://blog.jupyter.org/open-redirect-vulnerability-in-jupyter-jupyterhub-adf43583f1e4" + }, + { + "url": "https://github.com/jupyter/notebook/compare/16cf97c...b8e30ea", + "refsource": "MISC", + "name": "https://github.com/jupyter/notebook/compare/16cf97c...b8e30ea" + } + ] + } +} \ No newline at end of file diff --git a/2019/1xxx/CVE-2019-1827.json b/2019/1xxx/CVE-2019-1827.json index 3015c968cf6..497de730cb5 100644 --- a/2019/1xxx/CVE-2019-1827.json +++ b/2019/1xxx/CVE-2019-1827.json @@ -37,7 +37,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability in the Online Help web service of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the service. The vulnerability exists because the Online Help web service of an affected device insufficiently validates user-supplied input. An attacker could exploit this vulnerability by persuading a user of the service to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected service or access sensitive browser-based information.This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22. " + "value": "A vulnerability in the Online Help web service of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to conduct a reflected cross-site scripting (XSS) attack against a user of the service. The vulnerability exists because the Online Help web service of an affected device insufficiently validates user-supplied input. An attacker could exploit this vulnerability by persuading a user of the service to click a malicious link. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected service or access sensitive browser-based information.This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22." } ] }, @@ -84,4 +84,4 @@ ], "discovery": "INTERNAL" } -} +} \ No newline at end of file diff --git a/2019/1xxx/CVE-2019-1828.json b/2019/1xxx/CVE-2019-1828.json index 494524dbdbe..d06fd8bff5c 100644 --- a/2019/1xxx/CVE-2019-1828.json +++ b/2019/1xxx/CVE-2019-1828.json @@ -37,7 +37,7 @@ "description_data": [ { "lang": "eng", - "value": "A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to access administrative credentials. The vulnerability exists because affected devices use weak encryption algorithms for user credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack and decrypting intercepted credentials. A successful exploit could allow the attacker to gain access to an affected device with administrator privileges. This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22. " + "value": "A vulnerability in the web-based management interface of Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers could allow an unauthenticated, remote attacker to access administrative credentials. The vulnerability exists because affected devices use weak encryption algorithms for user credentials. An attacker could exploit this vulnerability by conducting a man-in-the-middle attack and decrypting intercepted credentials. A successful exploit could allow the attacker to gain access to an affected device with administrator privileges. This vulnerability affects Cisco Small Business RV320 and RV325 Dual Gigabit WAN VPN Routers running firmware releases prior to 1.4.2.22." } ] }, @@ -84,4 +84,4 @@ ], "discovery": "INTERNAL" } -} +} \ No newline at end of file diff --git a/2019/3xxx/CVE-2019-3886.json b/2019/3xxx/CVE-2019-3886.json index a42c9764349..334db0f978a 100644 --- a/2019/3xxx/CVE-2019-3886.json +++ b/2019/3xxx/CVE-2019-3886.json @@ -4,7 +4,8 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-3886", - "ASSIGNER": "psampaio@redhat.com" + "ASSIGNER": "secalert@redhat.com", + "STATE": "PUBLIC" }, "affects": { "vendor": { @@ -68,4 +69,4 @@ ] ] } -} +} \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7001.json b/2019/7xxx/CVE-2019-7001.json index d3ae229b5e8..5aac343867a 100644 --- a/2019/7xxx/CVE-2019-7001.json +++ b/2019/7xxx/CVE-2019-7001.json @@ -1,95 +1,95 @@ { - "CVE_data_meta": { - "ASSIGNER": "securityalerts@avaya.com", - "DATE_PUBLIC": "2019-04-04T00:00:00.000Z", - "ID": "CVE-2019-7001", - "STATE": "PUBLIC", - "TITLE": "Avaya IPOCC WebUI SQL Injection" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "IP Office Contact Center", - "version": { - "version_data": [ - { - "affected": "=", - "version_name": "10.0.x", - "version_value": "10.x" - }, - { - "affected": "<", - "version_name": "10.1.x", - "version_value": "10.1.2.2.2-11201.1908" - }, - { - "affected": "=", - "version_name": "9.x", - "version_value": "9.x" - } - ] - } - } - ] - }, - "vendor_name": "Avaya" - } - ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A SQL injection vulnerability in the WebUI component of IP Office Contact Center could allow an authenticated attacker to retrieve or alter sensitive data related to other users on the system. Affected versions of IP Office Contact Center include all 9.x and 10.x versions prior to 10.1.2.2.2-11201.1908. Unsupported versions not listed here were not evaluated." - } - ] - }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 9.9, - "baseSeverity": "CRITICAL", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "LOW", - "scope": "CHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", - "version": "3.0" - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')" - } + "CVE_data_meta": { + "ASSIGNER": "securityalerts@avaya.com", + "DATE_PUBLIC": "2019-04-04T00:00:00.000Z", + "ID": "CVE-2019-7001", + "STATE": "PUBLIC", + "TITLE": "Avaya IPOCC WebUI SQL Injection" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "IP Office Contact Center", + "version": { + "version_data": [ + { + "affected": "=", + "version_name": "10.0.x", + "version_value": "10.x" + }, + { + "affected": "<", + "version_name": "10.1.x", + "version_value": "10.1.2.2.2-11201.1908" + }, + { + "affected": "=", + "version_name": "9.x", + "version_value": "9.x" + } + ] + } + } + ] + }, + "vendor_name": "Avaya" + } ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://downloads.avaya.com/css/P8/documents/101056762", - "refsource": "CONFIRM", - "url": "https://downloads.avaya.com/css/P8/documents/101056762" - } - ] - }, - "source": { - "advisory": "ASA-2019-058" - } -} + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A SQL injection vulnerability in the WebUI component of IP Office Contact Center could allow an authenticated attacker to retrieve or alter sensitive data related to other users on the system. Affected versions of IP Office Contact Center include all 9.x and 10.x versions prior to 10.1.2.2.2-11201.1908. Unsupported versions not listed here were not evaluated." + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "NETWORK", + "availabilityImpact": "HIGH", + "baseScore": 9.9, + "baseSeverity": "CRITICAL", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "CHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "name": "https://downloads.avaya.com/css/P8/documents/101056762", + "refsource": "CONFIRM", + "url": "https://downloads.avaya.com/css/P8/documents/101056762" + } + ] + }, + "source": { + "advisory": "ASA-2019-058" + } +} \ No newline at end of file