From e7e515205235a2124d14f1afec1d493a3a62e05e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 7 Feb 2019 13:07:01 -0500 Subject: [PATCH] - Synchronized data. --- 2019/7xxx/CVE-2019-7581.json | 62 ++++++++++++++++++++++++++++++++++++ 2019/7xxx/CVE-2019-7582.json | 62 ++++++++++++++++++++++++++++++++++++ 2019/7xxx/CVE-2019-7583.json | 18 +++++++++++ 2019/7xxx/CVE-2019-7584.json | 18 +++++++++++ 2019/7xxx/CVE-2019-7585.json | 62 ++++++++++++++++++++++++++++++++++++ 5 files changed, 222 insertions(+) create mode 100644 2019/7xxx/CVE-2019-7581.json create mode 100644 2019/7xxx/CVE-2019-7582.json create mode 100644 2019/7xxx/CVE-2019-7583.json create mode 100644 2019/7xxx/CVE-2019-7584.json create mode 100644 2019/7xxx/CVE-2019-7585.json diff --git a/2019/7xxx/CVE-2019-7581.json b/2019/7xxx/CVE-2019-7581.json new file mode 100644 index 00000000000..b7b739a980c --- /dev/null +++ b/2019/7xxx/CVE-2019-7581.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7581", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "The parseSWF_ACTIONRECORD function in util/parser.c in libming through 0.4.8 allows remote attackers to have unspecified impact via a crafted swf file that triggers a memory allocation failure, a different vulnerability than CVE-2018-7876." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/libming/libming/issues/173", + "refsource" : "MISC", + "url" : "https://github.com/libming/libming/issues/173" + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7582.json b/2019/7xxx/CVE-2019-7582.json new file mode 100644 index 00000000000..96df430c473 --- /dev/null +++ b/2019/7xxx/CVE-2019-7582.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7582", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "The readBytes function in util/read.c in libming through 0.4.8 allows remote attackers to have unspecified impact via a crafted swf file that triggers a memory allocation failure." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/libming/libming/issues/172", + "refsource" : "MISC", + "url" : "https://github.com/libming/libming/issues/172" + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7583.json b/2019/7xxx/CVE-2019-7583.json new file mode 100644 index 00000000000..1ea7f676e7a --- /dev/null +++ b/2019/7xxx/CVE-2019-7583.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7583", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7584.json b/2019/7xxx/CVE-2019-7584.json new file mode 100644 index 00000000000..bd46dcdf188 --- /dev/null +++ b/2019/7xxx/CVE-2019-7584.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7584", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7585.json b/2019/7xxx/CVE-2019-7585.json new file mode 100644 index 00000000000..9027f6575ae --- /dev/null +++ b/2019/7xxx/CVE-2019-7585.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7585", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in Waimai Super Cms 20150505. web/Lib/Action/PublicAction.class.php allows time-based SQL Injection via the param array parameter to the /index.php?m=public&a=checkemail URI." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/caokang/waimai/issues/11", + "refsource" : "MISC", + "url" : "https://github.com/caokang/waimai/issues/11" + } + ] + } +}