diff --git a/2018/13xxx/CVE-2018-13400.json b/2018/13xxx/CVE-2018-13400.json index a9f1271c4e2..47beae5206e 100644 --- a/2018/13xxx/CVE-2018-13400.json +++ b/2018/13xxx/CVE-2018-13400.json @@ -1,117 +1,119 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@atlassian.com", - "DATE_PUBLIC": "2018-10-23T00:00:00", - "ID": "CVE-2018-13400", - "STATE": "PUBLIC" + "CVE_data_meta" : { + "ASSIGNER" : "security@atlassian.com", + "DATE_PUBLIC" : "2018-10-23T00:00:00", + "ID" : "CVE-2018-13400", + "STATE" : "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "Jira", - "version": { - "version_data": [ + "product_name" : "Jira", + "version" : { + "version_data" : [ { - "version_value": "7.6.9", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.6.9" }, { - "version_value": "7.7.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.7.0" }, { - "version_value": "7.7.5", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.7.5" }, { - "version_value": "7.8.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.8.0" }, { - "version_value": "7.8.5", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.8.5" }, { - "version_value": "7.9.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.9.0" }, { - "version_value": "7.9.3", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.9.3" }, { - "version_value": "7.10.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.10.0" }, { - "version_value": "7.10.3", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.10.3" }, { - "version_value": "7.11.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.11.0" }, { - "version_value": "7.11.3", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.11.3" }, { - "version_value": "7.12.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.12.0" }, { - "version_value": "7.12.3", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.12.3" }, { - "version_value": "7.13.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.13.0" }, { - "version_value": "7.13.1", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.13.1" } ] } } ] }, - "vendor_name": "Atlassian" + "vendor_name" : "Atlassian" } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "Several administrative resources in Atlassian Jira before version 7.6.9, from version 7.7.0 before version 7.7.5, from version 7.8.0 before version 7.8.5, from version 7.9.0 before version 7.9.3, from version 7.10.0 before version 7.10.3, from version 7.11.0 before version 7.11.3, from version 7.12.0 before version 7.12.3, and before version 7.13.1 allow remote attackers who have obtained access to administrator's session to access certain administrative resources without needing to re-authenticate to pass \"WebSudo\" through an improper access control vulnerability." + "lang" : "eng", + "value" : "Several administrative resources in Atlassian Jira before version 7.6.9, from version 7.7.0 before version 7.7.5, from version 7.8.0 before version 7.8.5, from version 7.9.0 before version 7.9.3, from version 7.10.0 before version 7.10.3, from version 7.11.0 before version 7.11.3, from version 7.12.0 before version 7.12.3, and before version 7.13.1 allow remote attackers who have obtained access to administrator's session to access certain administrative resources without needing to re-authenticate to pass \"WebSudo\" through an improper access control vulnerability." } ] }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "Improper Access Control" + "lang" : "eng", + "value" : "Improper Access Control" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "url": "https://jira.atlassian.com/browse/JRASERVER-68138" + "name" : "https://jira.atlassian.com/browse/JRASERVER-68138", + "refsource" : "CONFIRM", + "url" : "https://jira.atlassian.com/browse/JRASERVER-68138" } ] } diff --git a/2018/13xxx/CVE-2018-13401.json b/2018/13xxx/CVE-2018-13401.json index 537e755f960..7660077d7c8 100644 --- a/2018/13xxx/CVE-2018-13401.json +++ b/2018/13xxx/CVE-2018-13401.json @@ -1,117 +1,119 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@atlassian.com", - "DATE_PUBLIC": "2018-10-23T00:00:00", - "ID": "CVE-2018-13401", - "STATE": "PUBLIC" + "CVE_data_meta" : { + "ASSIGNER" : "security@atlassian.com", + "DATE_PUBLIC" : "2018-10-23T00:00:00", + "ID" : "CVE-2018-13401", + "STATE" : "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "Jira", - "version": { - "version_data": [ + "product_name" : "Jira", + "version" : { + "version_data" : [ { - "version_value": "7.6.9", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.6.9" }, { - "version_value": "7.7.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.7.0" }, { - "version_value": "7.7.5", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.7.5" }, { - "version_value": "7.8.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.8.0" }, { - "version_value": "7.8.5", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.8.5" }, { - "version_value": "7.9.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.9.0" }, { - "version_value": "7.9.3", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.9.3" }, { - "version_value": "7.10.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.10.0" }, { - "version_value": "7.10.3", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.10.3" }, { - "version_value": "7.11.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.11.0" }, { - "version_value": "7.11.3", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.11.3" }, { - "version_value": "7.12.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.12.0" }, { - "version_value": "7.12.3", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.12.3" }, { - "version_value": "7.13.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.13.0" }, { - "version_value": "7.13.1", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.13.1" } ] } } ] }, - "vendor_name": "Atlassian" + "vendor_name" : "Atlassian" } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "The XsrfErrorAction resource in Atlassian Jira before version 7.6.9, from version 7.7.0 before version 7.7.5, from version 7.8.0 before version 7.8.5, from version 7.9.0 before version 7.9.3, from version 7.10.0 before version 7.10.3, from version 7.11.0 before version 7.11.3, from version 7.12.0 before version 7.12.3, and before version 7.13.1 allows remote attackers to obtain a user's Cross-site request forgery (CSRF) token through an open redirect vulnerability." + "lang" : "eng", + "value" : "The XsrfErrorAction resource in Atlassian Jira before version 7.6.9, from version 7.7.0 before version 7.7.5, from version 7.8.0 before version 7.8.5, from version 7.9.0 before version 7.9.3, from version 7.10.0 before version 7.10.3, from version 7.11.0 before version 7.11.3, from version 7.12.0 before version 7.12.3, and before version 7.13.1 allows remote attackers to obtain a user's Cross-site request forgery (CSRF) token through an open redirect vulnerability." } ] }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "URL Redirection to Untrusted Site ('Open Redirect')" + "lang" : "eng", + "value" : "URL Redirection to Untrusted Site ('Open Redirect')" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "url": "https://jira.atlassian.com/browse/JRASERVER-68139" + "name" : "https://jira.atlassian.com/browse/JRASERVER-68139", + "refsource" : "CONFIRM", + "url" : "https://jira.atlassian.com/browse/JRASERVER-68139" } ] } diff --git a/2018/13xxx/CVE-2018-13402.json b/2018/13xxx/CVE-2018-13402.json index 0a150d5c932..a324fe06eea 100644 --- a/2018/13xxx/CVE-2018-13402.json +++ b/2018/13xxx/CVE-2018-13402.json @@ -1,117 +1,119 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@atlassian.com", - "DATE_PUBLIC": "2018-10-23T00:00:00", - "ID": "CVE-2018-13402", - "STATE": "PUBLIC" + "CVE_data_meta" : { + "ASSIGNER" : "security@atlassian.com", + "DATE_PUBLIC" : "2018-10-23T00:00:00", + "ID" : "CVE-2018-13402", + "STATE" : "PUBLIC" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "Jira", - "version": { - "version_data": [ + "product_name" : "Jira", + "version" : { + "version_data" : [ { - "version_value": "7.6.9", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.6.9" }, { - "version_value": "7.7.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.7.0" }, { - "version_value": "7.7.5", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.7.5" }, { - "version_value": "7.8.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.8.0" }, { - "version_value": "7.8.5", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.8.5" }, { - "version_value": "7.9.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.9.0" }, { - "version_value": "7.9.3", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.9.3" }, { - "version_value": "7.10.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.10.0" }, { - "version_value": "7.10.3", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.10.3" }, { - "version_value": "7.11.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.11.0" }, { - "version_value": "7.11.3", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.11.3" }, { - "version_value": "7.12.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.12.0" }, { - "version_value": "7.12.3", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.12.3" }, { - "version_value": "7.13.0", - "version_affected": ">=" + "version_affected" : ">=", + "version_value" : "7.13.0" }, { - "version_value": "7.13.1", - "version_affected": "<" + "version_affected" : "<", + "version_value" : "7.13.1" } ] } } ] }, - "vendor_name": "Atlassian" + "vendor_name" : "Atlassian" } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "Many resources in Atlassian Jira before version 7.6.9, from version 7.7.0 before version 7.7.5, from version 7.8.0 before version 7.8.5, from version 7.9.0 before version 7.9.3, from version 7.10.0 before version 7.10.3, from version 7.11.0 before version 7.11.3, from version 7.12.0 before version 7.12.3, and before version 7.13.1 allow remote attackers to attack users, in some cases be able to obtain a user's Cross-site request forgery (CSRF) token, via a open redirect vulnerability." + "lang" : "eng", + "value" : "Many resources in Atlassian Jira before version 7.6.9, from version 7.7.0 before version 7.7.5, from version 7.8.0 before version 7.8.5, from version 7.9.0 before version 7.9.3, from version 7.10.0 before version 7.10.3, from version 7.11.0 before version 7.11.3, from version 7.12.0 before version 7.12.3, and before version 7.13.1 allow remote attackers to attack users, in some cases be able to obtain a user's Cross-site request forgery (CSRF) token, via a open redirect vulnerability." } ] }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "URL Redirection to Untrusted Site ('Open Redirect')" + "lang" : "eng", + "value" : "URL Redirection to Untrusted Site ('Open Redirect')" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "url": "https://jira.atlassian.com/browse/JRASERVER-68140" + "name" : "https://jira.atlassian.com/browse/JRASERVER-68140", + "refsource" : "CONFIRM", + "url" : "https://jira.atlassian.com/browse/JRASERVER-68140" } ] } diff --git a/2018/15xxx/CVE-2018-15366.json b/2018/15xxx/CVE-2018-15366.json index ed22f694f36..b7f2b568530 100644 --- a/2018/15xxx/CVE-2018-15366.json +++ b/2018/15xxx/CVE-2018-15366.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A UrlfWTPPagePtr KERedirect Use-After-Free Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + "value" : "A UrlfWTPPagePtr KERedirect Use-After-Free Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, @@ -53,12 +53,18 @@ "references" : { "reference_data" : [ { + "name" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1293/", + "refsource" : "MISC", "url" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1293/" }, { + "name" : "https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx", + "refsource" : "CONFIRM", "url" : "https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx" }, { + "name" : "https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx", + "refsource" : "CONFIRM", "url" : "https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx" } ] diff --git a/2018/15xxx/CVE-2018-15367.json b/2018/15xxx/CVE-2018-15367.json index 6b23a5483ba..af14194019c 100644 --- a/2018/15xxx/CVE-2018-15367.json +++ b/2018/15xxx/CVE-2018-15367.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A ctl_set KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + "value" : "A ctl_set KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, @@ -53,12 +53,18 @@ "references" : { "reference_data" : [ { + "name" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1294/", + "refsource" : "MISC", "url" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1294/" }, { + "name" : "https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx", + "refsource" : "CONFIRM", "url" : "https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx" }, { + "name" : "https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx", + "refsource" : "CONFIRM", "url" : "https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx" } ] diff --git a/2018/18xxx/CVE-2018-18327.json b/2018/18xxx/CVE-2018-18327.json index 724b7ce7d42..35d574a4a7c 100644 --- a/2018/18xxx/CVE-2018-18327.json +++ b/2018/18xxx/CVE-2018-18327.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6eDC offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + "value" : "A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6eDC offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, @@ -53,12 +53,18 @@ "references" : { "reference_data" : [ { + "name" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1295/", + "refsource" : "MISC", "url" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1295/" }, { + "name" : "https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx", + "refsource" : "CONFIRM", "url" : "https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx" }, { + "name" : "https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx", + "refsource" : "CONFIRM", "url" : "https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx" } ] diff --git a/2018/18xxx/CVE-2018-18328.json b/2018/18xxx/CVE-2018-18328.json index 2cc5938b644..75dd8bd390e 100644 --- a/2018/18xxx/CVE-2018-18328.json +++ b/2018/18xxx/CVE-2018-18328.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6F6A offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + "value" : "A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6F6A offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, @@ -53,12 +53,18 @@ "references" : { "reference_data" : [ { + "name" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1296/", + "refsource" : "MISC", "url" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1296/" }, { + "name" : "https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx", + "refsource" : "CONFIRM", "url" : "https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx" }, { + "name" : "https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx", + "refsource" : "CONFIRM", "url" : "https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx" } ] diff --git a/2018/18xxx/CVE-2018-18329.json b/2018/18xxx/CVE-2018-18329.json index 15f12339869..8bf157318b8 100644 --- a/2018/18xxx/CVE-2018-18329.json +++ b/2018/18xxx/CVE-2018-18329.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6F4E offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." + "value" : "A KERedirect Untrusted Pointer Dereference Privilege Escalation vulnerability in Trend Micro Antivirus for Mac (Consumer) 7.0 (2017) and above could allow a local attacker to escalate privileges on vulnerable installations. The issue results from the lack of proper validation function on 0x6F4E offset user-supplied buffer. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability." } ] }, @@ -53,12 +53,18 @@ "references" : { "reference_data" : [ { + "name" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1297/", + "refsource" : "MISC", "url" : "https://www.zerodayinitiative.com/advisories/ZDI-18-1297/" }, { + "name" : "https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx", + "refsource" : "CONFIRM", "url" : "https://esupport.trendmicro.com/en-US/home/pages/technical-support/1121296.aspx" }, { + "name" : "https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx", + "refsource" : "CONFIRM", "url" : "https://esupport.trendmicro.com/solution/ja-jp/1121350.aspx" } ] diff --git a/2018/18xxx/CVE-2018-18588.json b/2018/18xxx/CVE-2018-18588.json new file mode 100644 index 00000000000..3b9f275a84e --- /dev/null +++ b/2018/18xxx/CVE-2018-18588.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18588", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/7xxx/CVE-2018-7911.json b/2018/7xxx/CVE-2018-7911.json index 917ca76b972..57a907e16ed 100644 --- a/2018/7xxx/CVE-2018-7911.json +++ b/2018/7xxx/CVE-2018-7911.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180822-01-frpbypass-en", + "refsource" : "CONFIRM", "url" : "http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20180822-01-frpbypass-en" } ]