- Synchronized data.

This commit is contained in:
CVE Team 2018-12-31 18:04:32 -05:00
parent a9c049cdfd
commit 288e937efa
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
2 changed files with 130 additions and 130 deletions

View File

@ -1,68 +1,68 @@
{ {
"CVE_data_meta": { "CVE_data_meta" : {
"ASSIGNER": "cve-assign@fb.com", "ASSIGNER" : "cve-assign@fb.com",
"DATE_ASSIGNED": "2018-03-26", "DATE_ASSIGNED" : "2018-03-26",
"ID": "CVE-2018-6331", "ID" : "CVE-2018-6331",
"STATE": "PUBLIC" "STATE" : "PUBLIC"
}, },
"affects": { "affects" : {
"vendor": { "vendor" : {
"vendor_data": [ "vendor_data" : [
{ {
"product": { "product" : {
"product_data": [ "product_data" : [
{ {
"product_name": "Buck", "product_name" : "Buck",
"version": { "version" : {
"version_data": [ "version_data" : [
{ {
"version_affected": "!=>", "version_affected" : "!=>",
"version_value": "v2018.06.25.01" "version_value" : "v2018.06.25.01"
}, },
{ {
"version_affected": "<=", "version_affected" : "<=",
"version_value": "v2018.06.25.01" "version_value" : "v2018.06.25.01"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "Facebook" "vendor_name" : "Facebook"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Buck parser-cache command loads/saves state using Java serialized object. If the state information is maliciously crafted, deserializing it could lead to code execution. This issue affects Buck versions prior to v2018.06.25.01."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Deserialization of Untrusted Data (CWE-502)"
}
] ]
} }
}, ]
"data_format": "MITRE", },
"data_type": "CVE", "references" : {
"data_version": "4.0", "reference_data" : [
"description": { {
"description_data": [ "name" : "https://github.com/facebook/buck/commit/8c5500981812564877bd122c0f8fab48d3528ddf",
{ "refsource" : "MISC",
"lang": "eng", "url" : "https://github.com/facebook/buck/commit/8c5500981812564877bd122c0f8fab48d3528ddf"
"value": "Buck parser-cache command loads/saves state using Java serialized object. If the state information is maliciously crafted, deserializing it could lead to code execution. This issue affects Buck versions prior to v2018.06.25.01." }
} ]
] }
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Deserialization of Untrusted Data (CWE-502)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/facebook/buck/commit/8c5500981812564877bd122c0f8fab48d3528ddf",
"refsource": "MISC",
"url": "https://github.com/facebook/buck/commit/8c5500981812564877bd122c0f8fab48d3528ddf"
}
]
}
} }

View File

@ -1,68 +1,68 @@
{ {
"CVE_data_meta": { "CVE_data_meta" : {
"ASSIGNER": "cve-assign@fb.com", "ASSIGNER" : "cve-assign@fb.com",
"DATE_ASSIGNED": "2018-03-19", "DATE_ASSIGNED" : "2018-03-19",
"ID": "CVE-2018-6333", "ID" : "CVE-2018-6333",
"STATE": "PUBLIC" "STATE" : "PUBLIC"
}, },
"affects": { "affects" : {
"vendor": { "vendor" : {
"vendor_data": [ "vendor_data" : [
{ {
"product": { "product" : {
"product_data": [ "product_data" : [
{ {
"product_name": "Nuclide", "product_name" : "Nuclide",
"version": { "version" : {
"version_data": [ "version_data" : [
{ {
"version_affected": "!=>", "version_affected" : "!=>",
"version_value": "v0.290.0" "version_value" : "v0.290.0"
}, },
{ {
"version_affected": "<=", "version_affected" : "<=",
"version_value": "v0.290.0" "version_value" : "v0.290.0"
} }
] ]
} }
} }
] ]
}, },
"vendor_name": "Facebook" "vendor_name" : "Facebook"
} }
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "The hhvm-attach deep link handler in Nuclide did not properly sanitize the provided hostname parameter when rendering. As a result, a malicious URL could be used to render HTML and other content inside of the editor's context, which could potentially be chained to lead to code execution. This issue affected Nuclide prior to v0.290.0."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "Improper Neutralization of Input During Web Page Generation (CWE-79)"
}
] ]
} }
}, ]
"data_format": "MITRE", },
"data_type": "CVE", "references" : {
"data_version": "4.0", "reference_data" : [
"description": { {
"description_data": [ "name" : "https://github.com/facebook/nuclide/commit/65f6bbd683404be1bb569b8d1be84b5d4c74a324",
{ "refsource" : "MISC",
"lang": "eng", "url" : "https://github.com/facebook/nuclide/commit/65f6bbd683404be1bb569b8d1be84b5d4c74a324"
"value": "The hhvm-attach deep link handler in Nuclide did not properly sanitize the provided hostname parameter when rendering. As a result, a malicious URL could be used to render HTML and other content inside of the editor's context, which could potentially be chained to lead to code execution. This issue affected Nuclude prior to v0.290.0." }
} ]
] }
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Improper Neutralization of Input During Web Page Generation (CWE-79)"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/facebook/nuclide/commit/65f6bbd683404be1bb569b8d1be84b5d4c74a324",
"refsource": "MISC",
"url": "https://github.com/facebook/nuclide/commit/65f6bbd683404be1bb569b8d1be84b5d4c74a324"
}
]
}
} }