From 05686c4ce99a35ac3f795befae5d98e3da7a5161 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 16 May 2018 10:04:55 -0400 Subject: [PATCH] - Synchronized data. --- 2013/6xxx/CVE-2013-6466.json | 5 ++++ 2017/10xxx/CVE-2017-10053.json | 5 ++++ 2017/10xxx/CVE-2017-10078.json | 5 ++++ 2017/10xxx/CVE-2017-10102.json | 5 ++++ 2017/10xxx/CVE-2017-10108.json | 5 ++++ 2017/10xxx/CVE-2017-10115.json | 5 ++++ 2017/10xxx/CVE-2017-10116.json | 5 ++++ 2017/10xxx/CVE-2017-10118.json | 5 ++++ 2017/10xxx/CVE-2017-10135.json | 5 ++++ 2017/10xxx/CVE-2017-10176.json | 5 ++++ 2017/10xxx/CVE-2017-10198.json | 5 ++++ 2017/13xxx/CVE-2017-13077.json | 10 +++++++ 2017/13xxx/CVE-2017-13078.json | 10 +++++++ 2017/13xxx/CVE-2017-13079.json | 5 ++++ 2017/13xxx/CVE-2017-13080.json | 10 +++++++ 2017/13xxx/CVE-2017-13081.json | 5 ++++ 2017/13xxx/CVE-2017-13082.json | 5 ++++ 2017/13xxx/CVE-2017-13086.json | 5 ++++ 2017/13xxx/CVE-2017-13087.json | 5 ++++ 2017/13xxx/CVE-2017-13088.json | 5 ++++ 2017/16xxx/CVE-2017-16741.json | 5 ++++ 2017/16xxx/CVE-2017-16743.json | 5 ++++ 2017/5xxx/CVE-2017-5715.json | 10 +++++++ 2017/5xxx/CVE-2017-5753.json | 10 +++++++ 2017/5xxx/CVE-2017-5754.json | 10 +++++++ 2018/10xxx/CVE-2018-10240.json | 48 ++++++++++++++++++++++++++++++++-- 2018/10xxx/CVE-2018-10241.json | 48 ++++++++++++++++++++++++++++++++-- 2018/10xxx/CVE-2018-10759.json | 48 ++++++++++++++++++++++++++++++++-- 2018/10xxx/CVE-2018-10760.json | 48 ++++++++++++++++++++++++++++++++-- 2018/11xxx/CVE-2018-11195.json | 18 +++++++++++++ 2018/11xxx/CVE-2018-11196.json | 18 +++++++++++++ 2018/11xxx/CVE-2018-11197.json | 18 +++++++++++++ 2018/11xxx/CVE-2018-11198.json | 18 +++++++++++++ 2018/11xxx/CVE-2018-11199.json | 18 +++++++++++++ 2018/11xxx/CVE-2018-11200.json | 18 +++++++++++++ 2018/11xxx/CVE-2018-11201.json | 18 +++++++++++++ 2018/5xxx/CVE-2018-5441.json | 5 ++++ 37 files changed, 470 insertions(+), 8 deletions(-) create mode 100644 2018/11xxx/CVE-2018-11195.json create mode 100644 2018/11xxx/CVE-2018-11196.json create mode 100644 2018/11xxx/CVE-2018-11197.json create mode 100644 2018/11xxx/CVE-2018-11198.json create mode 100644 2018/11xxx/CVE-2018-11199.json create mode 100644 2018/11xxx/CVE-2018-11200.json create mode 100644 2018/11xxx/CVE-2018-11201.json diff --git a/2013/6xxx/CVE-2013-6466.json b/2013/6xxx/CVE-2013-6466.json index 9facfe9646a..afc35124b34 100644 --- a/2013/6xxx/CVE-2013-6466.json +++ b/2013/6xxx/CVE-2013-6466.json @@ -57,6 +57,11 @@ "refsource" : "MISC", "url" : "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-001", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-001" + }, { "name" : "DSA-2893", "refsource" : "DEBIAN", diff --git a/2017/10xxx/CVE-2017-10053.json b/2017/10xxx/CVE-2017-10053.json index 09e39593dc1..02111500ec5 100644 --- a/2017/10xxx/CVE-2017-10053.json +++ b/2017/10xxx/CVE-2017-10053.json @@ -71,6 +71,11 @@ "refsource" : "CONFIRM", "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-002", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-002" + }, { "name" : "DSA-3919", "refsource" : "DEBIAN", diff --git a/2017/10xxx/CVE-2017-10078.json b/2017/10xxx/CVE-2017-10078.json index 7ab146eb3f8..5f34458c66d 100644 --- a/2017/10xxx/CVE-2017-10078.json +++ b/2017/10xxx/CVE-2017-10078.json @@ -63,6 +63,11 @@ "refsource" : "CONFIRM", "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-002", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-002" + }, { "name" : "DSA-3919", "refsource" : "DEBIAN", diff --git a/2017/10xxx/CVE-2017-10102.json b/2017/10xxx/CVE-2017-10102.json index 3136a470fec..34bde3eb201 100644 --- a/2017/10xxx/CVE-2017-10102.json +++ b/2017/10xxx/CVE-2017-10102.json @@ -71,6 +71,11 @@ "refsource" : "CONFIRM", "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-002", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-002" + }, { "name" : "DSA-3919", "refsource" : "DEBIAN", diff --git a/2017/10xxx/CVE-2017-10108.json b/2017/10xxx/CVE-2017-10108.json index 94348fc6d30..8cbbd0ef73e 100644 --- a/2017/10xxx/CVE-2017-10108.json +++ b/2017/10xxx/CVE-2017-10108.json @@ -71,6 +71,11 @@ "refsource" : "CONFIRM", "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-002", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-002" + }, { "name" : "DSA-3919", "refsource" : "DEBIAN", diff --git a/2017/10xxx/CVE-2017-10115.json b/2017/10xxx/CVE-2017-10115.json index ee39a96e2c5..ceab78df39c 100644 --- a/2017/10xxx/CVE-2017-10115.json +++ b/2017/10xxx/CVE-2017-10115.json @@ -71,6 +71,11 @@ "refsource" : "CONFIRM", "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-002", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-002" + }, { "name" : "DSA-3919", "refsource" : "DEBIAN", diff --git a/2017/10xxx/CVE-2017-10116.json b/2017/10xxx/CVE-2017-10116.json index 0f289e59049..23f216b67f9 100644 --- a/2017/10xxx/CVE-2017-10116.json +++ b/2017/10xxx/CVE-2017-10116.json @@ -71,6 +71,11 @@ "refsource" : "CONFIRM", "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-002", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-002" + }, { "name" : "DSA-3919", "refsource" : "DEBIAN", diff --git a/2017/10xxx/CVE-2017-10118.json b/2017/10xxx/CVE-2017-10118.json index ec7f57fdbf6..cb5fa132cbe 100644 --- a/2017/10xxx/CVE-2017-10118.json +++ b/2017/10xxx/CVE-2017-10118.json @@ -67,6 +67,11 @@ "refsource" : "CONFIRM", "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-002", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-002" + }, { "name" : "DSA-3919", "refsource" : "DEBIAN", diff --git a/2017/10xxx/CVE-2017-10135.json b/2017/10xxx/CVE-2017-10135.json index f369face9ba..b034c19012d 100644 --- a/2017/10xxx/CVE-2017-10135.json +++ b/2017/10xxx/CVE-2017-10135.json @@ -71,6 +71,11 @@ "refsource" : "CONFIRM", "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-002", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-002" + }, { "name" : "DSA-3919", "refsource" : "DEBIAN", diff --git a/2017/10xxx/CVE-2017-10176.json b/2017/10xxx/CVE-2017-10176.json index da1c7f3c2d2..bc570390f74 100644 --- a/2017/10xxx/CVE-2017-10176.json +++ b/2017/10xxx/CVE-2017-10176.json @@ -67,6 +67,11 @@ "refsource" : "CONFIRM", "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-002", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-002" + }, { "name" : "DSA-3919", "refsource" : "DEBIAN", diff --git a/2017/10xxx/CVE-2017-10198.json b/2017/10xxx/CVE-2017-10198.json index 683bd7fe7f7..73052f744b1 100644 --- a/2017/10xxx/CVE-2017-10198.json +++ b/2017/10xxx/CVE-2017-10198.json @@ -71,6 +71,11 @@ "refsource" : "CONFIRM", "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-002", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-002" + }, { "name" : "DSA-3919", "refsource" : "DEBIAN", diff --git a/2017/13xxx/CVE-2017-13077.json b/2017/13xxx/CVE-2017-13077.json index d39aa3a7304..9617b6887d2 100644 --- a/2017/13xxx/CVE-2017-13077.json +++ b/2017/13xxx/CVE-2017-13077.json @@ -130,6 +130,16 @@ "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-003", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-003" + }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-005", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-005" + }, { "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "refsource" : "CISCO", diff --git a/2017/13xxx/CVE-2017-13078.json b/2017/13xxx/CVE-2017-13078.json index 3d5b957c43f..40d0dadbc7c 100644 --- a/2017/13xxx/CVE-2017-13078.json +++ b/2017/13xxx/CVE-2017-13078.json @@ -125,6 +125,16 @@ "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-003", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-003" + }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-005", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-005" + }, { "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "refsource" : "CISCO", diff --git a/2017/13xxx/CVE-2017-13079.json b/2017/13xxx/CVE-2017-13079.json index a3f392963d9..3ff19b4fb56 100644 --- a/2017/13xxx/CVE-2017-13079.json +++ b/2017/13xxx/CVE-2017-13079.json @@ -100,6 +100,11 @@ "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-005", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-005" + }, { "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "refsource" : "CISCO", diff --git a/2017/13xxx/CVE-2017-13080.json b/2017/13xxx/CVE-2017-13080.json index b6a5e89c045..7234f891b5e 100644 --- a/2017/13xxx/CVE-2017-13080.json +++ b/2017/13xxx/CVE-2017-13080.json @@ -150,6 +150,16 @@ "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-003", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-003" + }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-005", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-005" + }, { "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "refsource" : "CISCO", diff --git a/2017/13xxx/CVE-2017-13081.json b/2017/13xxx/CVE-2017-13081.json index 2be475ac5a4..988af746b7f 100644 --- a/2017/13xxx/CVE-2017-13081.json +++ b/2017/13xxx/CVE-2017-13081.json @@ -95,6 +95,11 @@ "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-005", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-005" + }, { "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "refsource" : "CISCO", diff --git a/2017/13xxx/CVE-2017-13082.json b/2017/13xxx/CVE-2017-13082.json index a170f381c66..4108e980667 100644 --- a/2017/13xxx/CVE-2017-13082.json +++ b/2017/13xxx/CVE-2017-13082.json @@ -105,6 +105,11 @@ "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-005", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-005" + }, { "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "refsource" : "CISCO", diff --git a/2017/13xxx/CVE-2017-13086.json b/2017/13xxx/CVE-2017-13086.json index 8c507202b06..10fa1be63cd 100644 --- a/2017/13xxx/CVE-2017-13086.json +++ b/2017/13xxx/CVE-2017-13086.json @@ -90,6 +90,11 @@ "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-005", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-005" + }, { "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "refsource" : "CISCO", diff --git a/2017/13xxx/CVE-2017-13087.json b/2017/13xxx/CVE-2017-13087.json index 81a33aca708..4e9a30f25d7 100644 --- a/2017/13xxx/CVE-2017-13087.json +++ b/2017/13xxx/CVE-2017-13087.json @@ -90,6 +90,11 @@ "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-005", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-005" + }, { "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "refsource" : "CISCO", diff --git a/2017/13xxx/CVE-2017-13088.json b/2017/13xxx/CVE-2017-13088.json index 8fc0f72e237..de600da6dc2 100644 --- a/2017/13xxx/CVE-2017-13088.json +++ b/2017/13xxx/CVE-2017-13088.json @@ -90,6 +90,11 @@ "refsource" : "CONFIRM", "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-005", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-005" + }, { "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "refsource" : "CISCO", diff --git a/2017/16xxx/CVE-2017-16741.json b/2017/16xxx/CVE-2017-16741.json index 2c706ff51cb..50989ca230c 100644 --- a/2017/16xxx/CVE-2017-16741.json +++ b/2017/16xxx/CVE-2017-16741.json @@ -56,6 +56,11 @@ "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03", "refsource" : "MISC", "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03" + }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-006", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-006" } ] } diff --git a/2017/16xxx/CVE-2017-16743.json b/2017/16xxx/CVE-2017-16743.json index 335de267fcb..e449a3c6212 100644 --- a/2017/16xxx/CVE-2017-16743.json +++ b/2017/16xxx/CVE-2017-16743.json @@ -56,6 +56,11 @@ "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03", "refsource" : "MISC", "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03" + }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2017-006", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2017-006" } ] } diff --git a/2017/5xxx/CVE-2017-5715.json b/2017/5xxx/CVE-2017-5715.json index 4cc4b949b79..96b9532ea84 100644 --- a/2017/5xxx/CVE-2017-5715.json +++ b/2017/5xxx/CVE-2017-5715.json @@ -203,6 +203,16 @@ "refsource" : "CONFIRM", "url" : "https://securityadvisories.paloaltonetworks.com/Home/Detail/121" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2018-002", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2018-002" + }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2018-003", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2018-003" + }, { "name" : "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "refsource" : "CISCO", diff --git a/2017/5xxx/CVE-2017-5753.json b/2017/5xxx/CVE-2017-5753.json index 9611e6da2c7..35d5c50f0bd 100644 --- a/2017/5xxx/CVE-2017-5753.json +++ b/2017/5xxx/CVE-2017-5753.json @@ -183,6 +183,16 @@ "refsource" : "CONFIRM", "url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2018-002", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2018-002" + }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2018-003", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2018-003" + }, { "name" : "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "refsource" : "CISCO", diff --git a/2017/5xxx/CVE-2017-5754.json b/2017/5xxx/CVE-2017-5754.json index 4c1147a2cc5..6d6c0769b37 100644 --- a/2017/5xxx/CVE-2017-5754.json +++ b/2017/5xxx/CVE-2017-5754.json @@ -178,6 +178,16 @@ "refsource" : "CONFIRM", "url" : "https://support.citrix.com/article/CTX234679" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2018-002", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2018-002" + }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2018-003", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2018-003" + }, { "name" : "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "refsource" : "CISCO", diff --git a/2018/10xxx/CVE-2018-10240.json b/2018/10xxx/CVE-2018-10240.json index 73a2180b41c..037fff4528f 100644 --- a/2018/10xxx/CVE-2018-10240.json +++ b/2018/10xxx/CVE-2018-10240.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-10240", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "SolarWinds Serv-U MFT before 15.1.6 HFv1 assigns authenticated users a low-entropy session token that can be included in requests to the application as a URL parameter in lieu of a session cookie. This session token's value can be brute-forced by an attacker to obtain the corresponding session cookie and hijack the user's session." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-insufficient-session-id-entropy/", + "refsource" : "MISC", + "url" : "https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-insufficient-session-id-entropy/" } ] } diff --git a/2018/10xxx/CVE-2018-10241.json b/2018/10xxx/CVE-2018-10241.json index 45fcf0e2d1d..9789aad213b 100644 --- a/2018/10xxx/CVE-2018-10241.json +++ b/2018/10xxx/CVE-2018-10241.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-10241", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "A denial of service vulnerability in SolarWinds Serv-U before 15.1.6 HFv1 allows an authenticated user to crash the application (with a NULL pointer dereference) via a specially crafted URL beginning with the /Web%20Client/ substring." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-denial-of-service/", + "refsource" : "MISC", + "url" : "https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-denial-of-service/" } ] } diff --git a/2018/10xxx/CVE-2018-10759.json b/2018/10xxx/CVE-2018-10759.json index 165f73b646f..3e4e6b4a72b 100644 --- a/2018/10xxx/CVE-2018-10759.json +++ b/2018/10xxx/CVE-2018-10759.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-10759", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "PHP remote file inclusion vulnerability in public/patch/patch.php in Project Pier 0.8.8 and earlier allows remote attackers to execute arbitrary commands or SQL statements via the id parameter." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "20180513 CVE-2018-10759/CVE-2018-10760: Project Pier 0.8.8 vulnerabilities", + "refsource" : "FULLDISC", + "url" : "http://seclists.org/fulldisclosure/2018/May/30" } ] } diff --git a/2018/10xxx/CVE-2018-10760.json b/2018/10xxx/CVE-2018-10760.json index ac0744bb610..ac2f2659070 100644 --- a/2018/10xxx/CVE-2018-10760.json +++ b/2018/10xxx/CVE-2018-10760.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-10760", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Unrestricted file upload vulnerability in the Files plugin in ProjectPier 0.88 and earlier allows remote authenticated users to execute arbitrary PHP code by uploading a file with an executable extension, then accessing it via a direct request to the file in the tmp directory under the document root." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "20180513 CVE-2018-10759/CVE-2018-10760: Project Pier 0.8.8 vulnerabilities", + "refsource" : "FULLDISC", + "url" : "http://seclists.org/fulldisclosure/2018/May/30" } ] } diff --git a/2018/11xxx/CVE-2018-11195.json b/2018/11xxx/CVE-2018-11195.json new file mode 100644 index 00000000000..a12e7d7d450 --- /dev/null +++ b/2018/11xxx/CVE-2018-11195.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11195", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11196.json b/2018/11xxx/CVE-2018-11196.json new file mode 100644 index 00000000000..1079d95d247 --- /dev/null +++ b/2018/11xxx/CVE-2018-11196.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11196", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11197.json b/2018/11xxx/CVE-2018-11197.json new file mode 100644 index 00000000000..c051af1aff3 --- /dev/null +++ b/2018/11xxx/CVE-2018-11197.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11197", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11198.json b/2018/11xxx/CVE-2018-11198.json new file mode 100644 index 00000000000..478c0222b7d --- /dev/null +++ b/2018/11xxx/CVE-2018-11198.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11198", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11199.json b/2018/11xxx/CVE-2018-11199.json new file mode 100644 index 00000000000..72bb9b05754 --- /dev/null +++ b/2018/11xxx/CVE-2018-11199.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11199", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11200.json b/2018/11xxx/CVE-2018-11200.json new file mode 100644 index 00000000000..b90c058582c --- /dev/null +++ b/2018/11xxx/CVE-2018-11200.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11200", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11201.json b/2018/11xxx/CVE-2018-11201.json new file mode 100644 index 00000000000..2c3dfb7730a --- /dev/null +++ b/2018/11xxx/CVE-2018-11201.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11201", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/5xxx/CVE-2018-5441.json b/2018/5xxx/CVE-2018-5441.json index f4d63688076..5a8d478acda 100644 --- a/2018/5xxx/CVE-2018-5441.json +++ b/2018/5xxx/CVE-2018-5441.json @@ -57,6 +57,11 @@ "refsource" : "MISC", "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01" }, + { + "name" : "https://cert.vde.com/en-us/advisories/vde-2018-001", + "refsource" : "CONFIRM", + "url" : "https://cert.vde.com/en-us/advisories/vde-2018-001" + }, { "name" : "102907", "refsource" : "BID",