- Synchronized data.

This commit is contained in:
CVE Team 2018-05-16 10:04:55 -04:00
parent 4de101a23d
commit 05686c4ce9
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
37 changed files with 470 additions and 8 deletions

View File

@ -57,6 +57,11 @@
"refsource" : "MISC", "refsource" : "MISC",
"url" : "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt" "url" : "https://libreswan.org/security/CVE-2013-6467/CVE-2013-6467.txt"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-001",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-001"
},
{ {
"name" : "DSA-2893", "name" : "DSA-2893",
"refsource" : "DEBIAN", "refsource" : "DEBIAN",

View File

@ -71,6 +71,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-002",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-002"
},
{ {
"name" : "DSA-3919", "name" : "DSA-3919",
"refsource" : "DEBIAN", "refsource" : "DEBIAN",

View File

@ -63,6 +63,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-002",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-002"
},
{ {
"name" : "DSA-3919", "name" : "DSA-3919",
"refsource" : "DEBIAN", "refsource" : "DEBIAN",

View File

@ -71,6 +71,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-002",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-002"
},
{ {
"name" : "DSA-3919", "name" : "DSA-3919",
"refsource" : "DEBIAN", "refsource" : "DEBIAN",

View File

@ -71,6 +71,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-002",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-002"
},
{ {
"name" : "DSA-3919", "name" : "DSA-3919",
"refsource" : "DEBIAN", "refsource" : "DEBIAN",

View File

@ -71,6 +71,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-002",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-002"
},
{ {
"name" : "DSA-3919", "name" : "DSA-3919",
"refsource" : "DEBIAN", "refsource" : "DEBIAN",

View File

@ -71,6 +71,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-002",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-002"
},
{ {
"name" : "DSA-3919", "name" : "DSA-3919",
"refsource" : "DEBIAN", "refsource" : "DEBIAN",

View File

@ -67,6 +67,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-002",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-002"
},
{ {
"name" : "DSA-3919", "name" : "DSA-3919",
"refsource" : "DEBIAN", "refsource" : "DEBIAN",

View File

@ -71,6 +71,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-002",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-002"
},
{ {
"name" : "DSA-3919", "name" : "DSA-3919",
"refsource" : "DEBIAN", "refsource" : "DEBIAN",

View File

@ -67,6 +67,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-002",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-002"
},
{ {
"name" : "DSA-3919", "name" : "DSA-3919",
"refsource" : "DEBIAN", "refsource" : "DEBIAN",

View File

@ -71,6 +71,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://security.netapp.com/advisory/ntap-20170720-0001/" "url" : "https://security.netapp.com/advisory/ntap-20170720-0001/"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-002",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-002"
},
{ {
"name" : "DSA-3919", "name" : "DSA-3919",
"refsource" : "DEBIAN", "refsource" : "DEBIAN",

View File

@ -130,6 +130,16 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-003",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-003"
},
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-005",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-005"
},
{ {
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
"refsource" : "CISCO", "refsource" : "CISCO",

View File

@ -125,6 +125,16 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-003",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-003"
},
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-005",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-005"
},
{ {
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
"refsource" : "CISCO", "refsource" : "CISCO",

View File

@ -100,6 +100,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-005",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-005"
},
{ {
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
"refsource" : "CISCO", "refsource" : "CISCO",

View File

@ -150,6 +150,16 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-003",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-003"
},
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-005",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-005"
},
{ {
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
"refsource" : "CISCO", "refsource" : "CISCO",

View File

@ -95,6 +95,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-005",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-005"
},
{ {
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
"refsource" : "CISCO", "refsource" : "CISCO",

View File

@ -105,6 +105,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-005",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-005"
},
{ {
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
"refsource" : "CISCO", "refsource" : "CISCO",

View File

@ -90,6 +90,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-005",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-005"
},
{ {
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
"refsource" : "CISCO", "refsource" : "CISCO",

View File

@ -90,6 +90,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-005",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-005"
},
{ {
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
"refsource" : "CISCO", "refsource" : "CISCO",

View File

@ -90,6 +90,11 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf" "url" : "https://cert-portal.siemens.com/productcert/pdf/ssa-901333.pdf"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-005",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-005"
},
{ {
"name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II", "name" : "20171016 Multiple Vulnerabilities in Wi-Fi Protected Access and Wi-Fi Protected Access II",
"refsource" : "CISCO", "refsource" : "CISCO",

View File

@ -56,6 +56,11 @@
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03", "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03",
"refsource" : "MISC", "refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03" "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03"
},
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-006",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-006"
} }
] ]
} }

View File

@ -56,6 +56,11 @@
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03", "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03",
"refsource" : "MISC", "refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03" "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-011-03"
},
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2017-006",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2017-006"
} }
] ]
} }

View File

@ -203,6 +203,16 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://securityadvisories.paloaltonetworks.com/Home/Detail/121" "url" : "https://securityadvisories.paloaltonetworks.com/Home/Detail/121"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2018-002",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2018-002"
},
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2018-003",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2018-003"
},
{ {
"name" : "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "name" : "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
"refsource" : "CISCO", "refsource" : "CISCO",

View File

@ -183,6 +183,16 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html" "url" : "http://www.oracle.com/technetwork/security-advisory/cpuapr2018-3678067.html"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2018-002",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2018-002"
},
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2018-003",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2018-003"
},
{ {
"name" : "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "name" : "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
"refsource" : "CISCO", "refsource" : "CISCO",

View File

@ -178,6 +178,16 @@
"refsource" : "CONFIRM", "refsource" : "CONFIRM",
"url" : "https://support.citrix.com/article/CTX234679" "url" : "https://support.citrix.com/article/CTX234679"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2018-002",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2018-002"
},
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2018-003",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2018-003"
},
{ {
"name" : "20180104 CPU Side-Channel Information Disclosure Vulnerabilities", "name" : "20180104 CPU Side-Channel Information Disclosure Vulnerabilities",
"refsource" : "CISCO", "refsource" : "CISCO",

View File

@ -2,7 +2,30 @@
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-10240", "ID" : "CVE-2018-10240",
"STATE" : "RESERVED" "STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
}, },
"data_format" : "MITRE", "data_format" : "MITRE",
"data_type" : "CVE", "data_type" : "CVE",
@ -11,7 +34,28 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value" : "SolarWinds Serv-U MFT before 15.1.6 HFv1 assigns authenticated users a low-entropy session token that can be included in requests to the application as a URL parameter in lieu of a session cookie. This session token's value can be brute-forced by an attacker to obtain the corresponding session cookie and hijack the user's session."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-insufficient-session-id-entropy/",
"refsource" : "MISC",
"url" : "https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-insufficient-session-id-entropy/"
} }
] ]
} }

View File

@ -2,7 +2,30 @@
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-10241", "ID" : "CVE-2018-10241",
"STATE" : "RESERVED" "STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
}, },
"data_format" : "MITRE", "data_format" : "MITRE",
"data_type" : "CVE", "data_type" : "CVE",
@ -11,7 +34,28 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value" : "A denial of service vulnerability in SolarWinds Serv-U before 15.1.6 HFv1 allows an authenticated user to crash the application (with a NULL pointer dereference) via a specially crafted URL beginning with the /Web%20Client/ substring."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-denial-of-service/",
"refsource" : "MISC",
"url" : "https://www.bishopfox.com/news/2018/05/solarwinds-serv-u-managed-file-transfer-denial-of-service/"
} }
] ]
} }

View File

@ -2,7 +2,30 @@
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-10759", "ID" : "CVE-2018-10759",
"STATE" : "RESERVED" "STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
}, },
"data_format" : "MITRE", "data_format" : "MITRE",
"data_type" : "CVE", "data_type" : "CVE",
@ -11,7 +34,28 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value" : "PHP remote file inclusion vulnerability in public/patch/patch.php in Project Pier 0.8.8 and earlier allows remote attackers to execute arbitrary commands or SQL statements via the id parameter."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20180513 CVE-2018-10759/CVE-2018-10760: Project Pier 0.8.8 vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2018/May/30"
} }
] ]
} }

View File

@ -2,7 +2,30 @@
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-10760", "ID" : "CVE-2018-10760",
"STATE" : "RESERVED" "STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
}, },
"data_format" : "MITRE", "data_format" : "MITRE",
"data_type" : "CVE", "data_type" : "CVE",
@ -11,7 +34,28 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "value" : "Unrestricted file upload vulnerability in the Files plugin in ProjectPier 0.88 and earlier allows remote authenticated users to execute arbitrary PHP code by uploading a file with an executable extension, then accessing it via a direct request to the file in the tmp directory under the document root."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20180513 CVE-2018-10759/CVE-2018-10760: Project Pier 0.8.8 vulnerabilities",
"refsource" : "FULLDISC",
"url" : "http://seclists.org/fulldisclosure/2018/May/30"
} }
] ]
} }

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-11195",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-11196",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-11197",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-11198",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-11199",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-11200",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-11201",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -57,6 +57,11 @@
"refsource" : "MISC", "refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01" "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-030-01"
}, },
{
"name" : "https://cert.vde.com/en-us/advisories/vde-2018-001",
"refsource" : "CONFIRM",
"url" : "https://cert.vde.com/en-us/advisories/vde-2018-001"
},
{ {
"name" : "102907", "name" : "102907",
"refsource" : "BID", "refsource" : "BID",