diff --git a/2019/3xxx/CVE-2019-3581.json b/2019/3xxx/CVE-2019-3581.json index f902f1dd46d..0e77ebffd81 100644 --- a/2019/3xxx/CVE-2019-3581.json +++ b/2019/3xxx/CVE-2019-3581.json @@ -1,110 +1,110 @@ { - "CVE_data_meta": { - "ASSIGNER": "psirt@mcafee.com", - "ID": "CVE-2019-3581", - "STATE": "PUBLIC", - "TITLE": "McAfee Web Gateway denial of service attack due to Improper Input Validation" + "CVE_data_meta" : { + "ASSIGNER" : "psirt@mcafee.com", + "ID" : "CVE-2019-3581", + "STATE" : "PUBLIC", + "TITLE" : "McAfee Web Gateway denial of service attack due to Improper Input Validation" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "McAfee Web Gateway", - "version": { - "version_data": [ + "product_name" : "McAfee Web Gateway", + "version" : { + "version_data" : [ { - "affected": ">=", - "platform": "x86", - "version_name": "7.8.2", - "version_value": "7.8.2" + "affected" : ">=", + "platform" : "x86", + "version_name" : "7.8.2", + "version_value" : "7.8.2" }, { - "affected": "<", - "platform": "x86", - "version_name": "7.8.2.5", - "version_value": "7.8.2.5" + "affected" : "<", + "platform" : "x86", + "version_name" : "7.8.2.5", + "version_value" : "7.8.2.5" }, { - "affected": ">=", - "platform": "x86", - "version_name": "8.0", - "version_value": "8.0" + "affected" : ">=", + "platform" : "x86", + "version_name" : "8.0", + "version_value" : "8.0" }, { - "affected": "<", - "platform": "x86", - "version_name": "8.0.2", - "version_value": "8.0.2" + "affected" : "<", + "platform" : "x86", + "version_name" : "8.0.2", + "version_value" : "8.0.2" } ] } } ] }, - "vendor_name": "McAfee" + "vendor_name" : "McAfee" } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "Improper input validation in the proxy component of McAfee Web Gateway 7.8.2.0 and later allows remote attackers to cause a denial of service via a crafted HTTP request parameter." + "lang" : "eng", + "value" : "Improper input validation in the proxy component of McAfee Web Gateway 7.8.2.0 and later allows remote attackers to cause a denial of service via a crafted HTTP request parameter." } ] }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "HIGH", - "baseScore": 7.5, - "baseSeverity": "HIGH", - "confidentialityImpact": "NONE", - "integrityImpact": "NONE", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "LOW", + "attackVector" : "NETWORK", + "availabilityImpact" : "HIGH", + "baseScore" : 7.5, + "baseSeverity" : "HIGH", + "confidentialityImpact" : "NONE", + "integrityImpact" : "NONE", + "privilegesRequired" : "NONE", + "scope" : "UNCHANGED", + "userInteraction" : "NONE", + "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "CWE-20: Improper Input Validation" + "lang" : "eng", + "value" : "CWE-20: Improper Input Validation" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10264", - "refsource": "CONFIRM", - "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10264" + "name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10264", + "refsource" : "CONFIRM", + "url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10264" } ] }, - "solution": [ + "solution" : [ { - "lang": "eng", - "value": "Update to MWG 7.8.2.5 or 8.0.2" + "lang" : "eng", + "value" : "Update to MWG 7.8.2.5 or 8.0.2" } ], - "source": { - "advisory": "SB10264", - "discovery": "INTERNAL" + "source" : { + "advisory" : "SB10264", + "discovery" : "INTERNAL" } } diff --git a/2019/5xxx/CVE-2019-5737.json b/2019/5xxx/CVE-2019-5737.json new file mode 100644 index 00000000000..3b16092f5cb --- /dev/null +++ b/2019/5xxx/CVE-2019-5737.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-5737", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5738.json b/2019/5xxx/CVE-2019-5738.json new file mode 100644 index 00000000000..2d18f474851 --- /dev/null +++ b/2019/5xxx/CVE-2019-5738.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-5738", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5739.json b/2019/5xxx/CVE-2019-5739.json new file mode 100644 index 00000000000..101a2d05f40 --- /dev/null +++ b/2019/5xxx/CVE-2019-5739.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-5739", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5740.json b/2019/5xxx/CVE-2019-5740.json new file mode 100644 index 00000000000..9a75cafd632 --- /dev/null +++ b/2019/5xxx/CVE-2019-5740.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-5740", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5741.json b/2019/5xxx/CVE-2019-5741.json new file mode 100644 index 00000000000..d09a5533487 --- /dev/null +++ b/2019/5xxx/CVE-2019-5741.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-5741", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5742.json b/2019/5xxx/CVE-2019-5742.json new file mode 100644 index 00000000000..3d1a3cc7302 --- /dev/null +++ b/2019/5xxx/CVE-2019-5742.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-5742", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5743.json b/2019/5xxx/CVE-2019-5743.json new file mode 100644 index 00000000000..4ccbd70822b --- /dev/null +++ b/2019/5xxx/CVE-2019-5743.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-5743", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5744.json b/2019/5xxx/CVE-2019-5744.json new file mode 100644 index 00000000000..adf474ab331 --- /dev/null +++ b/2019/5xxx/CVE-2019-5744.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-5744", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5745.json b/2019/5xxx/CVE-2019-5745.json new file mode 100644 index 00000000000..fa3351ccd0c --- /dev/null +++ b/2019/5xxx/CVE-2019-5745.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-5745", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5746.json b/2019/5xxx/CVE-2019-5746.json new file mode 100644 index 00000000000..193c21df53a --- /dev/null +++ b/2019/5xxx/CVE-2019-5746.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-5746", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}