From 04a04fc9ab195b0038f5379cbd361f3a228c8547 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 29 Nov 2018 22:03:22 -0500 Subject: [PATCH] - Synchronized data. --- 2018/19xxx/CVE-2018-19755.json | 67 ++++++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19756.json | 62 +++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19757.json | 62 +++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19758.json | 62 +++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19759.json | 62 +++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19760.json | 62 +++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19761.json | 62 +++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19762.json | 62 +++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19763.json | 62 +++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19764.json | 62 +++++++++++++++++++++++++++++++ 10 files changed, 625 insertions(+) create mode 100644 2018/19xxx/CVE-2018-19755.json create mode 100644 2018/19xxx/CVE-2018-19756.json create mode 100644 2018/19xxx/CVE-2018-19757.json create mode 100644 2018/19xxx/CVE-2018-19758.json create mode 100644 2018/19xxx/CVE-2018-19759.json create mode 100644 2018/19xxx/CVE-2018-19760.json create mode 100644 2018/19xxx/CVE-2018-19761.json create mode 100644 2018/19xxx/CVE-2018-19762.json create mode 100644 2018/19xxx/CVE-2018-19763.json create mode 100644 2018/19xxx/CVE-2018-19764.json diff --git a/2018/19xxx/CVE-2018-19755.json b/2018/19xxx/CVE-2018-19755.json new file mode 100644 index 00000000000..412e6f00211 --- /dev/null +++ b/2018/19xxx/CVE-2018-19755.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19755", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "There is an illegal address access at asm/preproc.c (function: is_mmacro) in Netwide Assembler (NASM) 2.14rc16 that will cause a denial of service (out-of-bounds array access) because a certain conversion can result in a negative integer." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.nasm.us/show_bug.cgi?id=3392528", + "refsource" : "MISC", + "url" : "https://bugzilla.nasm.us/show_bug.cgi?id=3392528" + }, + { + "name" : "https://repo.or.cz/nasm.git/commit/3079f7966dbed4497e36d5067cbfd896a90358cb", + "refsource" : "MISC", + "url" : "https://repo.or.cz/nasm.git/commit/3079f7966dbed4497e36d5067cbfd896a90358cb" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19756.json b/2018/19xxx/CVE-2018-19756.json new file mode 100644 index 00000000000..f86bc9db975 --- /dev/null +++ b/2018/19xxx/CVE-2018-19756.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19756", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "There is a heap-based buffer over-read at stb_image.h (function: stbi__tga_load) in libsixel 1.8.2 that will cause a denial of service." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1649198", + "refsource" : "MISC", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1649198" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19757.json b/2018/19xxx/CVE-2018-19757.json new file mode 100644 index 00000000000..6f21d20f32a --- /dev/null +++ b/2018/19xxx/CVE-2018-19757.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19757", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "There is a NULL pointer dereference at function sixel_helper_set_additional_message (status.c) in libsixel 1.8.2 that will cause a denial of service." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1649197", + "refsource" : "MISC", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1649197" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19758.json b/2018/19xxx/CVE-2018-19758.json new file mode 100644 index 00000000000..16d91b75c05 --- /dev/null +++ b/2018/19xxx/CVE-2018-19758.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19758", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "There is a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1643812", + "refsource" : "MISC", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1643812" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19759.json b/2018/19xxx/CVE-2018-19759.json new file mode 100644 index 00000000000..e90706a8276 --- /dev/null +++ b/2018/19xxx/CVE-2018-19759.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19759", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "There is a heap-based buffer over-read at stb_image_write.h (function: stbi_write_png_to_mem) in libsixel 1.8.2 that will cause a denial of service." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1649202", + "refsource" : "MISC", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1649202" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19760.json b/2018/19xxx/CVE-2018-19760.json new file mode 100644 index 00000000000..f5f52f3cb8f --- /dev/null +++ b/2018/19xxx/CVE-2018-19760.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19760", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "cfg_init in confuse.c in libConfuse 3.2.2 has a memory leak." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1649152", + "refsource" : "MISC", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1649152" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19761.json b/2018/19xxx/CVE-2018-19761.json new file mode 100644 index 00000000000..5bd32ed2bf9 --- /dev/null +++ b/2018/19xxx/CVE-2018-19761.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19761", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "There is an illegal address access at fromsixel.c (function: sixel_decode_raw_impl) in libsixel 1.8.2 that will cause a denial of service." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1649200", + "refsource" : "MISC", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1649200" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19762.json b/2018/19xxx/CVE-2018-19762.json new file mode 100644 index 00000000000..5f87bbef775 --- /dev/null +++ b/2018/19xxx/CVE-2018-19762.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19762", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "There is a heap-based buffer overflow at fromsixel.c (function: image_buffer_resize) in libsixel 1.8.2 that will cause a denial of service or possibly unspecified other impact." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1649199", + "refsource" : "MISC", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1649199" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19763.json b/2018/19xxx/CVE-2018-19763.json new file mode 100644 index 00000000000..71bbe68f2cd --- /dev/null +++ b/2018/19xxx/CVE-2018-19763.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19763", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "There is a heap-based buffer over-read at writer.c (function: write_png_to_file) in libsixel 1.8.2 that will cause a denial of service." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=1649201", + "refsource" : "MISC", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1649201" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19764.json b/2018/19xxx/CVE-2018-19764.json new file mode 100644 index 00000000000..eeaece19ede --- /dev/null +++ b/2018/19xxx/CVE-2018-19764.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19764", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Mini-XML (aka mxml) 2.12 has memory leaks." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/michaelrsweet/mxml/issues/232", + "refsource" : "MISC", + "url" : "https://github.com/michaelrsweet/mxml/issues/232" + } + ] + } +}