diff --git a/2016/9xxx/CVE-2016-9840.json b/2016/9xxx/CVE-2016-9840.json index 691ad10d9d5..cc0105bdb13 100644 --- a/2016/9xxx/CVE-2016-9840.json +++ b/2016/9xxx/CVE-2016-9840.json @@ -171,6 +171,11 @@ "name": "RHSA-2017:2999", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2999" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", + "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html" } ] } diff --git a/2016/9xxx/CVE-2016-9841.json b/2016/9xxx/CVE-2016-9841.json index 78fd225ac6b..85ee749ebaf 100644 --- a/2016/9xxx/CVE-2016-9841.json +++ b/2016/9xxx/CVE-2016-9841.json @@ -186,6 +186,11 @@ "name": "RHSA-2017:2999", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2999" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", + "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html" } ] } diff --git a/2016/9xxx/CVE-2016-9842.json b/2016/9xxx/CVE-2016-9842.json index 966fb242dc9..573120fe1ac 100644 --- a/2016/9xxx/CVE-2016-9842.json +++ b/2016/9xxx/CVE-2016-9842.json @@ -171,6 +171,11 @@ "name": "RHSA-2017:2999", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2999" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", + "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html" } ] } diff --git a/2016/9xxx/CVE-2016-9843.json b/2016/9xxx/CVE-2016-9843.json index 88b018e8e24..6be4b1fa319 100644 --- a/2016/9xxx/CVE-2016-9843.json +++ b/2016/9xxx/CVE-2016-9843.json @@ -186,6 +186,11 @@ "name": "RHSA-2017:2999", "refsource": "REDHAT", "url": "https://access.redhat.com/errata/RHSA-2017:2999" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", + "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html" } ] } diff --git a/2018/1xxx/CVE-2018-1320.json b/2018/1xxx/CVE-2018-1320.json index 5ea9ab7e856..38fe67fcae7 100644 --- a/2018/1xxx/CVE-2018-1320.json +++ b/2018/1xxx/CVE-2018-1320.json @@ -66,6 +66,11 @@ "name": "[debian-lts-announce] 20190206 [SECURITY] [DLA 1662-1] libthrift-java security update", "refsource": "MLIST", "url": "https://lists.debian.org/debian-lts-announce/2019/02/msg00008.html" + }, + { + "refsource": "MLIST", + "name": "[infra-devnull] 20190324 [GitHub] [thrift] luciferous opened pull request #1771: THRIFT-4506: fix use of assert for correctness in Java SASL negotiation", + "url": "https://lists.apache.org/thread.html/187684ac8b94d55256253f5220cb55e8bd568afdf9a8a86e9bbb66c9@%3Cdevnull.infra.apache.org%3E" } ] } diff --git a/2018/5xxx/CVE-2018-5764.json b/2018/5xxx/CVE-2018-5764.json index 27aff55a4a0..484da1aca1e 100644 --- a/2018/5xxx/CVE-2018-5764.json +++ b/2018/5xxx/CVE-2018-5764.json @@ -86,6 +86,11 @@ "name": "https://download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS", "refsource": "CONFIRM", "url": "https://download.samba.org/pub/rsync/src-previews/rsync-3.1.3pre1-NEWS" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20190324 [SECURITY] [DLA 1725-1] rsync security update", + "url": "https://lists.debian.org/debian-lts-announce/2019/03/msg00027.html" } ] } diff --git a/2019/10xxx/CVE-2019-10018.json b/2019/10xxx/CVE-2019-10018.json new file mode 100644 index 00000000000..97bf78df999 --- /dev/null +++ b/2019/10xxx/CVE-2019-10018.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-10018", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is an FPE in the function PostScriptFunction::exec at Function.cc for the psOpIdiv case." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276" + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10019.json b/2019/10xxx/CVE-2019-10019.json new file mode 100644 index 00000000000..fc9c208843b --- /dev/null +++ b/2019/10xxx/CVE-2019-10019.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-10019", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is an FPE in the function PSOutputDev::checkPageSlice at PSOutputDev.cc for nStripes." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41275", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41275" + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10020.json b/2019/10xxx/CVE-2019-10020.json new file mode 100644 index 00000000000..c785f37481b --- /dev/null +++ b/2019/10xxx/CVE-2019-10020.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-10020", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is an FPE in the function Splash::scaleImageYuXu at Splash.cc for x Bresenham parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274" + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10021.json b/2019/10xxx/CVE-2019-10021.json new file mode 100644 index 00000000000..9d2a5b8298f --- /dev/null +++ b/2019/10xxx/CVE-2019-10021.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-10021", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is an FPE in the function ImageStream::ImageStream at Stream.cc for nComps." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274" + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10022.json b/2019/10xxx/CVE-2019-10022.json new file mode 100644 index 00000000000..4872075daeb --- /dev/null +++ b/2019/10xxx/CVE-2019-10022.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-10022", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is a NULL pointer dereference in the function Gfx::opSetExtGState in Gfx.cc." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41273", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41273" + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10023.json b/2019/10xxx/CVE-2019-10023.json new file mode 100644 index 00000000000..1d7acb55118 --- /dev/null +++ b/2019/10xxx/CVE-2019-10023.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-10023", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is an FPE in the function PostScriptFunction::exec at Function.cc for the psOpMod case." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276" + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10024.json b/2019/10xxx/CVE-2019-10024.json new file mode 100644 index 00000000000..76512b5dbe1 --- /dev/null +++ b/2019/10xxx/CVE-2019-10024.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-10024", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is an FPE in the function Splash::scaleImageYuXu at Splash.cc for y Bresenham parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274" + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10025.json b/2019/10xxx/CVE-2019-10025.json new file mode 100644 index 00000000000..033e5f25426 --- /dev/null +++ b/2019/10xxx/CVE-2019-10025.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-10025", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is an FPE in the function ImageStream::ImageStream at Stream.cc for nBits." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41274" + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10026.json b/2019/10xxx/CVE-2019-10026.json new file mode 100644 index 00000000000..e0c8548d79e --- /dev/null +++ b/2019/10xxx/CVE-2019-10026.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-10026", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in Xpdf 4.01.01. There is an FPE in the function PostScriptFunction::exec in Function.cc for the psOpRoll case." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276", + "refsource": "MISC", + "name": "https://forum.xpdfreader.com/viewtopic.php?f=3&t=41276" + } + ] + } +} \ No newline at end of file diff --git a/2019/10xxx/CVE-2019-10027.json b/2019/10xxx/CVE-2019-10027.json new file mode 100644 index 00000000000..4e173939033 --- /dev/null +++ b/2019/10xxx/CVE-2019-10027.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-10027", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "PHPCMS 9.6.x through 9.6.3 has XSS via the mailbox (aka E-mail) field on the personal information screen." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://sharemice.github.io/phpcms_xss/", + "refsource": "MISC", + "name": "https://sharemice.github.io/phpcms_xss/" + }, + { + "url": "https://github.com/sharemice/phpcms_xss/blob/master/index.html", + "refsource": "MISC", + "name": "https://github.com/sharemice/phpcms_xss/blob/master/index.html" + } + ] + } +} \ No newline at end of file