- Synchronized data.

This commit is contained in:
CVE Team 2018-04-04 14:04:03 -04:00
parent 541df80b82
commit 17d2a3e941
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
13 changed files with 482 additions and 329 deletions

View File

@ -1,41 +1,9 @@
{
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM QRadar 7.3 and 7.3.1 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 133122."
}
]
},
"data_version" : "4.0",
"data_format" : "MITRE",
"impact" : {
"cvssv3" : {
"BM" : {
"PR" : "L",
"I" : "L",
"A" : "N",
"AV" : "N",
"AC" : "H",
"S" : "U",
"SCORE" : "4.200",
"UI" : "N",
"C" : "L"
}
}
},
"data_type" : "CVE",
"references" : {
"reference_data" : [
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22015236",
"name" : "IBM Security Bulletin 2015236 (Security QRadar SIEM)"
},
{
"name" : "X-Force Vulnerability Report",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/133122"
}
]
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2018-04-02T00:00:00",
"ID" : "CVE-2017-1624",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
@ -44,6 +12,7 @@
"product" : {
"product_data" : [
{
"product_name" : "Security QRadar SIEM",
"version" : {
"version_data" : [
{
@ -53,8 +22,7 @@
"version_value" : "7.3.1"
}
]
},
"product_name" : "Security QRadar SIEM"
}
}
]
},
@ -63,11 +31,31 @@
]
}
},
"CVE_data_meta" : {
"DATE_PUBLIC" : "2018-04-02T00:00:00",
"ASSIGNER" : "psirt@us.ibm.com",
"STATE" : "PUBLIC",
"ID" : "CVE-2017-1624"
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM QRadar 7.3 and 7.3.1 specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. IBM X-Force ID: 133122."
}
]
},
"impact" : {
"cvssv3" : {
"BM" : {
"A" : "N",
"AC" : "H",
"AV" : "N",
"C" : "L",
"I" : "L",
"PR" : "L",
"S" : "U",
"SCORE" : "4.200",
"UI" : "N"
}
}
},
"problemtype" : {
"problemtype_data" : [
@ -80,5 +68,15 @@
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/133122"
},
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22015236"
}
]
}
}

View File

@ -1,65 +1,14 @@
{
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Obtain Information",
"lang" : "eng"
}
]
}
]
},
"CVE_data_meta" : {
"ID" : "CVE-2017-1733",
"STATE" : "PUBLIC",
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2018-04-02T00:00:00",
"ASSIGNER" : "psirt@us.ibm.com"
"ID" : "CVE-2017-1733",
"STATE" : "PUBLIC"
},
"data_version" : "4.0",
"references" : {
"reference_data" : [
{
"name" : "IBM Security Bulletin 2015243 (Security QRadar SIEM)",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22015243"
},
{
"name" : "X-Force Vulnerability Report",
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/134914"
}
]
},
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM QRadar 7.3 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 134914."
}
]
},
"impact" : {
"cvssv3" : {
"BM" : {
"S" : "U",
"AV" : "L",
"UI" : "N",
"C" : "L",
"AC" : "L",
"A" : "N",
"I" : "N",
"PR" : "N",
"SCORE" : "4.000"
}
}
},
"data_type" : "CVE",
"data_format" : "MITRE",
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "IBM",
"product" : {
"product_data" : [
{
@ -73,9 +22,58 @@
}
}
]
}
},
"vendor_name" : "IBM"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM QRadar 7.3 stores potentially sensitive information in log files that could be read by a local user. IBM X-Force ID: 134914."
}
]
},
"impact" : {
"cvssv3" : {
"BM" : {
"A" : "N",
"AC" : "L",
"AV" : "L",
"C" : "L",
"I" : "N",
"PR" : "N",
"S" : "U",
"SCORE" : "4.000",
"UI" : "N"
}
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Obtain Information"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/134914"
},
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22015243"
}
]
}
}

View File

@ -1,52 +1,18 @@
{
"data_format" : "MITRE",
"data_type" : "CVE",
"references" : {
"reference_data" : [
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg2C1000369",
"name" : "IBM Security Bulletin C1000369 (MobileFirst Platform Foundation)"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/136786",
"name" : "X-Force Vulnerability Report"
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Cross-Site Scripting",
"lang" : "eng"
}
]
}
]
},
"CVE_data_meta" : {
"STATE" : "PUBLIC",
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2018-03-30T00:00:00",
"ID" : "CVE-2017-1772",
"ASSIGNER" : "psirt@us.ibm.com"
},
"description" : {
"description_data" : [
{
"value" : "IBM Worklight (IBM MobileFirst Platform Foundation 6.3, 7.0, 7.1, and 8.0) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 136786.",
"lang" : "eng"
}
]
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "IBM",
"product" : {
"product_data" : [
{
"product_name" : "MobileFirst Platform Foundation",
"version" : {
"version_data" : [
{
@ -62,29 +28,61 @@
"version_value" : "8.0"
}
]
},
"product_name" : "MobileFirst Platform Foundation"
}
}
]
}
},
"vendor_name" : "IBM"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM Worklight (IBM MobileFirst Platform Foundation 6.3, 7.0, 7.1, and 8.0) is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session. IBM X-Force ID: 136786."
}
]
},
"impact" : {
"cvssv3" : {
"BM" : {
"SCORE" : "6.100",
"A" : "N",
"AC" : "L",
"AV" : "N",
"C" : "L",
"UI" : "R",
"I" : "L",
"PR" : "N",
"S" : "C",
"AC" : "L",
"A" : "N",
"AV" : "N",
"I" : "L"
"SCORE" : "6.100",
"UI" : "R"
}
}
},
"data_version" : "4.0"
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Cross-Site Scripting"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/136786"
},
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg2C1000369"
}
]
}
}

View File

@ -15,4 +15,4 @@
}
]
}
}
}

View File

@ -1,59 +1,9 @@
{
"data_type" : "CVE",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM WebSphere DataPower Appliances 7.1, 7.2, 7.5, 7.5.1, 7.5.2, and 7.6 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 139023."
}
]
},
"data_version" : "4.0",
"references" : {
"reference_data" : [
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22015055",
"name" : "IBM Security Bulletin 2015055 (DataPower Gateways)"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/139023",
"name" : "X-Force Vulnerability Report"
}
]
},
"impact" : {
"cvssv3" : {
"BM" : {
"A" : "L",
"UI" : "N",
"AC" : "L",
"AV" : "N",
"S" : "U",
"I" : "N",
"SCORE" : "7.100",
"PR" : "L",
"C" : "H"
}
}
},
"CVE_data_meta" : {
"ID" : "CVE-2018-1421",
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2018-04-03T00:00:00",
"STATE" : "PUBLIC",
"ASSIGNER" : "psirt@us.ibm.com"
},
"data_format" : "MITRE",
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Obtain Information",
"lang" : "eng"
}
]
}
]
"ID" : "CVE-2018-1421",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
@ -62,6 +12,7 @@
"product" : {
"product_data" : [
{
"product_name" : "DataPower Gateways",
"version" : {
"version_data" : [
{
@ -83,8 +34,7 @@
"version_value" : "7.6"
}
]
},
"product_name" : "DataPower Gateways"
}
}
]
},
@ -92,5 +42,53 @@
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "IBM WebSphere DataPower Appliances 7.1, 7.2, 7.5, 7.5.1, 7.5.2, and 7.6 is vulnerable to a XML External Entity Injection (XXE) attack when processing XML data. A remote attacker could exploit this vulnerability to expose sensitive information or consume memory resources. IBM X-Force ID: 139023."
}
]
},
"impact" : {
"cvssv3" : {
"BM" : {
"A" : "L",
"AC" : "L",
"AV" : "N",
"C" : "H",
"I" : "N",
"PR" : "L",
"S" : "U",
"SCORE" : "7.100",
"UI" : "N"
}
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Obtain Information"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/139023"
},
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22015055"
}
]
}
}

View File

@ -1,80 +1,18 @@
{
"data_version" : "4.0",
"impact" : {
"cvssv3" : {
"BM" : {
"PR" : "N",
"I" : "N",
"S" : "U",
"SCORE" : "5.100",
"AC" : "H",
"C" : "H",
"UI" : "N",
"AV" : "L",
"A" : "N"
}
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"value" : "Obtain Information",
"lang" : "eng"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "IBM Security Bulletin 2015066 (Spectrum Protect for Virtual Environments)",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22015066"
},
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22014669",
"name" : "IBM Security Bulletin 2014669 (Spectrum Protect)"
},
{
"name" : "IBM Security Bulletin 2015071 (Spectrum Protect Snapshot)",
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22015071"
},
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22014957",
"name" : "IBM Security Bulletin 2014957 (Spectrum Protect for Space Management)"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/139972",
"name" : "X-Force Vulnerability Report"
}
]
},
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2018-03-29T00:00:00",
"STATE" : "PUBLIC",
"ID" : "CVE-2018-1447",
"ASSIGNER" : "psirt@us.ibm.com"
"STATE" : "PUBLIC"
},
"description" : {
"description_data" : [
{
"value" : "The GSKit (IBM Spectrum Protect 7.1 and 7.2) and (IBM Spectrum Protect Snapshot 4.1.3, 4.1.4, and 4.1.6) CMS KDB logic fails to salt the hash function resulting in weaker than expected protection of passwords. A weak password may be recovered. Note: After update the customer should change password to ensure the new password is stored more securely. Products should encourage customers to take this step as a high priority action. IBM X-Force ID: 139972.",
"lang" : "eng"
}
]
},
"data_type" : "CVE",
"data_format" : "MITRE",
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "IBM",
"product" : {
"product_data" : [
{
"product_name" : "Spectrum Protect",
"version" : {
"version_data" : [
{
@ -84,8 +22,7 @@
"version_value" : "8.1"
}
]
},
"product_name" : "Spectrum Protect"
}
},
{
"product_name" : "Spectrum Protect Snapshot",
@ -104,6 +41,7 @@
}
},
{
"product_name" : "Spectrum Protect for Virtual Environments",
"version" : {
"version_data" : [
{
@ -113,10 +51,10 @@
"version_value" : "8.1"
}
]
},
"product_name" : "Spectrum Protect for Virtual Environments"
}
},
{
"product_name" : "Spectrum Protect for Space Management",
"version" : {
"version_data" : [
{
@ -126,13 +64,70 @@
"version_value" : "8.1"
}
]
},
"product_name" : "Spectrum Protect for Space Management"
}
}
]
}
},
"vendor_name" : "IBM"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The GSKit (IBM Spectrum Protect 7.1 and 7.2) and (IBM Spectrum Protect Snapshot 4.1.3, 4.1.4, and 4.1.6) CMS KDB logic fails to salt the hash function resulting in weaker than expected protection of passwords. A weak password may be recovered. Note: After update the customer should change password to ensure the new password is stored more securely. Products should encourage customers to take this step as a high priority action. IBM X-Force ID: 139972."
}
]
},
"impact" : {
"cvssv3" : {
"BM" : {
"A" : "N",
"AC" : "H",
"AV" : "L",
"C" : "H",
"I" : "N",
"PR" : "N",
"S" : "U",
"SCORE" : "5.100",
"UI" : "N"
}
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Obtain Information"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/139972"
},
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22014669"
},
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22014957"
},
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22015066"
},
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22015071"
}
]
}
}

View File

@ -1,39 +1,9 @@
{
"impact" : {
"cvssv3" : {
"BM" : {
"AV" : "N",
"UI" : "N",
"C" : "H",
"I" : "H",
"AC" : "L",
"SCORE" : "9.800",
"A" : "H",
"PR" : "N",
"S" : "U"
}
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Gain Access"
}
]
}
]
},
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"value" : "IBM API Connect Developer Portal 5.0.0.0 through 5.0.8.2 could allow an unathenticated attacker to execute system commands using specially crafted HTTP requests. IBM X-Force ID: 140605.",
"lang" : "eng"
}
]
"CVE_data_meta" : {
"ASSIGNER" : "psirt@us.ibm.com",
"DATE_PUBLIC" : "2018-04-02T00:00:00",
"ID" : "CVE-2018-1469",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
@ -42,6 +12,7 @@
"product" : {
"product_data" : [
{
"product_name" : "API Connect",
"version" : {
"version_data" : [
{
@ -102,8 +73,7 @@
"version_value" : "5.0.8.2"
}
]
},
"product_name" : "API Connect"
}
}
]
},
@ -112,24 +82,52 @@
]
}
},
"CVE_data_meta" : {
"DATE_PUBLIC" : "2018-04-02T00:00:00",
"STATE" : "PUBLIC",
"ID" : "CVE-2018-1469",
"ASSIGNER" : "psirt@us.ibm.com"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"references" : {
"reference_data" : [
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22014940",
"name" : "IBM Security Bulletin 2014940 (API Connect)"
},
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/140605",
"name" : "X-Force Vulnerability Report"
"lang" : "eng",
"value" : "IBM API Connect Developer Portal 5.0.0.0 through 5.0.8.2 could allow an unauthenticated attacker to execute system commands using specially crafted HTTP requests. IBM X-Force ID: 140605."
}
]
},
"data_format" : "MITRE"
"impact" : {
"cvssv3" : {
"BM" : {
"A" : "H",
"AC" : "L",
"AV" : "N",
"C" : "H",
"I" : "H",
"PR" : "N",
"S" : "U",
"SCORE" : "9.800",
"UI" : "N"
}
}
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Gain Access"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/140605"
},
{
"url" : "http://www.ibm.com/support/docview.wss?uid=swg22014940"
}
]
}
}

View File

@ -53,7 +53,7 @@
"references" : {
"reference_data" : [
{
"url" : "http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=4"
"url" : "http://public.support.unisys.com/common/public/vulnerability/NVD_Detail_Rpt.aspx?ID=48"
}
]
}

View File

@ -2,7 +2,30 @@
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-9119",
"STATE" : "RESERVED"
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
@ -11,7 +34,32 @@
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
"value" : "An attacker with physical access to a BrilliantTS FUZE card (MCU firmware 0.1.73, BLE firmware 0.7.4) can unlock the card, extract credit card numbers, and tamper with data on the card via Bluetooth because no authentication is needed, as demonstrated by gatttool."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://blog.ice9.us/2018/04/stealing-credit-cards-from-fuze-bluetooth.html"
},
{
"url" : "https://ice9.us/advisories/ICE9-2018-001.txt"
},
{
"url" : "https://www.reddit.com/r/netsec/comments/89qrp1/stealing_credit_cards_from_fuze_via_bluetooth/"
}
]
}

View File

@ -0,0 +1,66 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-9275",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "In check_user_token in util.c in the Yubico PAM module (aka pam_yubico) 2.18 through 2.25, successful logins can leak file descriptors to the auth mapping file, which can lead to information disclosure (serial number of a device) and/or DoS (reaching the maximum number of file descriptors)."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"url" : "https://bugzilla.opensuse.org/show_bug.cgi?id=1088027"
},
{
"url" : "https://github.com/Yubico/yubico-pam/commit/0f6ceabab0a8849b47f67d727aa526c2656089ba"
},
{
"url" : "https://github.com/Yubico/yubico-pam/issues/136"
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-9276",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-9277",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}

View File

@ -0,0 +1,18 @@
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-9278",
"STATE" : "RESERVED"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}