From 3286749f8c96546a6c6594d43f426efa4cf5907a Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 25 May 2018 09:21:44 -0400 Subject: [PATCH] - Synchronized data. --- 2017/3xxx/CVE-2017-3961.json | 106 ++++++++++++++++----------------- 2018/11xxx/CVE-2018-11446.json | 18 ++++++ 2018/11xxx/CVE-2018-11447.json | 18 ++++++ 2018/11xxx/CVE-2018-11448.json | 18 ++++++ 2018/11xxx/CVE-2018-11449.json | 18 ++++++ 2018/11xxx/CVE-2018-11450.json | 18 ++++++ 2018/11xxx/CVE-2018-11451.json | 18 ++++++ 2018/11xxx/CVE-2018-11452.json | 18 ++++++ 2018/11xxx/CVE-2018-11453.json | 18 ++++++ 2018/11xxx/CVE-2018-11454.json | 18 ++++++ 2018/11xxx/CVE-2018-11455.json | 18 ++++++ 2018/11xxx/CVE-2018-11456.json | 18 ++++++ 2018/11xxx/CVE-2018-11457.json | 18 ++++++ 2018/11xxx/CVE-2018-11458.json | 18 ++++++ 2018/11xxx/CVE-2018-11459.json | 18 ++++++ 2018/11xxx/CVE-2018-11460.json | 18 ++++++ 2018/11xxx/CVE-2018-11461.json | 18 ++++++ 2018/11xxx/CVE-2018-11462.json | 18 ++++++ 2018/11xxx/CVE-2018-11463.json | 18 ++++++ 2018/11xxx/CVE-2018-11464.json | 18 ++++++ 2018/11xxx/CVE-2018-11465.json | 18 ++++++ 2018/11xxx/CVE-2018-11466.json | 18 ++++++ 2018/11xxx/CVE-2018-11467.json | 18 ++++++ 2018/11xxx/CVE-2018-11468.json | 62 +++++++++++++++++++ 2018/6xxx/CVE-2018-6674.json | 106 ++++++++++++++++----------------- 25 files changed, 564 insertions(+), 106 deletions(-) create mode 100644 2018/11xxx/CVE-2018-11446.json create mode 100644 2018/11xxx/CVE-2018-11447.json create mode 100644 2018/11xxx/CVE-2018-11448.json create mode 100644 2018/11xxx/CVE-2018-11449.json create mode 100644 2018/11xxx/CVE-2018-11450.json create mode 100644 2018/11xxx/CVE-2018-11451.json create mode 100644 2018/11xxx/CVE-2018-11452.json create mode 100644 2018/11xxx/CVE-2018-11453.json create mode 100644 2018/11xxx/CVE-2018-11454.json create mode 100644 2018/11xxx/CVE-2018-11455.json create mode 100644 2018/11xxx/CVE-2018-11456.json create mode 100644 2018/11xxx/CVE-2018-11457.json create mode 100644 2018/11xxx/CVE-2018-11458.json create mode 100644 2018/11xxx/CVE-2018-11459.json create mode 100644 2018/11xxx/CVE-2018-11460.json create mode 100644 2018/11xxx/CVE-2018-11461.json create mode 100644 2018/11xxx/CVE-2018-11462.json create mode 100644 2018/11xxx/CVE-2018-11463.json create mode 100644 2018/11xxx/CVE-2018-11464.json create mode 100644 2018/11xxx/CVE-2018-11465.json create mode 100644 2018/11xxx/CVE-2018-11466.json create mode 100644 2018/11xxx/CVE-2018-11467.json create mode 100644 2018/11xxx/CVE-2018-11468.json diff --git a/2017/3xxx/CVE-2017-3961.json b/2017/3xxx/CVE-2017-3961.json index 774b2f593ec..201a6f69899 100644 --- a/2017/3xxx/CVE-2017-3961.json +++ b/2017/3xxx/CVE-2017-3961.json @@ -1,87 +1,87 @@ { - "CVE_data_meta": { - "ASSIGNER": "psirt@mcafee.com", - "DATE_PUBLIC": "2017-03-29T17:00:00.000Z", - "ID": "CVE-2017-3961", - "STATE": "PUBLIC", - "TITLE": "SB10192 - Network Security Management (NSM) - Cross-Site Scripting (XSS) vulnerability" + "CVE_data_meta" : { + "ASSIGNER" : "psirt@mcafee.com", + "DATE_PUBLIC" : "2017-03-29T17:00:00.000Z", + "ID" : "CVE-2017-3961", + "STATE" : "PUBLIC", + "TITLE" : "SB10192 - Network Security Management (NSM) - Cross-Site Scripting (XSS) vulnerability" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "Network Security Management (NSM)", - "version": { - "version_data": [ + "product_name" : "Network Security Management (NSM)", + "version" : { + "version_data" : [ { - "affected": "<", - "platform": "x86", - "version_name": "8.2.7.42.2", - "version_value": "8.2.7.42.2" + "affected" : "<", + "platform" : "x86", + "version_name" : "8.2.7.42.2", + "version_value" : "8.2.7.42.2" } ] } } ] }, - "vendor_name": "McAfee" + "vendor_name" : "McAfee" } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "Cross-Site Scripting (XSS) vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows authenticated users to allow arbitrary HTML code to be reflected in the response web page via crafted user input of attributes." + "lang" : "eng", + "value" : "Cross-Site Scripting (XSS) vulnerability in the web interface in McAfee Network Security Management (NSM) before 8.2.7.42.2 allows authenticated users to allow arbitrary HTML code to be reflected in the response web page via crafted user input of attributes." } ] }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "LOW", - "baseScore": 3.5, - "baseSeverity": "LOW", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "privilegesRequired": "HIGH", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "LOW", + "attackVector" : "NETWORK", + "availabilityImpact" : "LOW", + "baseScore" : 3.5, + "baseSeverity" : "LOW", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "privilegesRequired" : "HIGH", + "scope" : "UNCHANGED", + "userInteraction" : "REQUIRED", + "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:L", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "Cross-Site Scripting (XSS) vulnerability" + "lang" : "eng", + "value" : "Cross-Site Scripting (XSS) vulnerability" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "name": "McAfee SB10192", - "refsource": "CONFIRM", - "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10192" + "name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10192", + "refsource" : "CONFIRM", + "url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10192" } ] }, - "source": { - "advisory": "SB10192", - "discovery": "INTERNAL" + "source" : { + "advisory" : "SB10192", + "discovery" : "INTERNAL" } } diff --git a/2018/11xxx/CVE-2018-11446.json b/2018/11xxx/CVE-2018-11446.json new file mode 100644 index 00000000000..05361b9123d --- /dev/null +++ b/2018/11xxx/CVE-2018-11446.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11446", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11447.json b/2018/11xxx/CVE-2018-11447.json new file mode 100644 index 00000000000..a99daaa9973 --- /dev/null +++ b/2018/11xxx/CVE-2018-11447.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11447", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11448.json b/2018/11xxx/CVE-2018-11448.json new file mode 100644 index 00000000000..054776ada66 --- /dev/null +++ b/2018/11xxx/CVE-2018-11448.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11448", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11449.json b/2018/11xxx/CVE-2018-11449.json new file mode 100644 index 00000000000..ba3e209a949 --- /dev/null +++ b/2018/11xxx/CVE-2018-11449.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11449", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11450.json b/2018/11xxx/CVE-2018-11450.json new file mode 100644 index 00000000000..fa0de8a935e --- /dev/null +++ b/2018/11xxx/CVE-2018-11450.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11450", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11451.json b/2018/11xxx/CVE-2018-11451.json new file mode 100644 index 00000000000..37fefbae3d8 --- /dev/null +++ b/2018/11xxx/CVE-2018-11451.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11451", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11452.json b/2018/11xxx/CVE-2018-11452.json new file mode 100644 index 00000000000..f0da0bc8c5b --- /dev/null +++ b/2018/11xxx/CVE-2018-11452.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11452", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11453.json b/2018/11xxx/CVE-2018-11453.json new file mode 100644 index 00000000000..22f7e3db738 --- /dev/null +++ b/2018/11xxx/CVE-2018-11453.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11453", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11454.json b/2018/11xxx/CVE-2018-11454.json new file mode 100644 index 00000000000..0d69ec10681 --- /dev/null +++ b/2018/11xxx/CVE-2018-11454.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11454", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11455.json b/2018/11xxx/CVE-2018-11455.json new file mode 100644 index 00000000000..77a2ea1165e --- /dev/null +++ b/2018/11xxx/CVE-2018-11455.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11455", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11456.json b/2018/11xxx/CVE-2018-11456.json new file mode 100644 index 00000000000..36978941546 --- /dev/null +++ b/2018/11xxx/CVE-2018-11456.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11456", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11457.json b/2018/11xxx/CVE-2018-11457.json new file mode 100644 index 00000000000..468b7c986ee --- /dev/null +++ b/2018/11xxx/CVE-2018-11457.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11457", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11458.json b/2018/11xxx/CVE-2018-11458.json new file mode 100644 index 00000000000..7ba0f459fec --- /dev/null +++ b/2018/11xxx/CVE-2018-11458.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11458", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11459.json b/2018/11xxx/CVE-2018-11459.json new file mode 100644 index 00000000000..cd28ad238ee --- /dev/null +++ b/2018/11xxx/CVE-2018-11459.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11459", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11460.json b/2018/11xxx/CVE-2018-11460.json new file mode 100644 index 00000000000..ce0e42c7e72 --- /dev/null +++ b/2018/11xxx/CVE-2018-11460.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11460", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11461.json b/2018/11xxx/CVE-2018-11461.json new file mode 100644 index 00000000000..b4e83f3bf88 --- /dev/null +++ b/2018/11xxx/CVE-2018-11461.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11461", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11462.json b/2018/11xxx/CVE-2018-11462.json new file mode 100644 index 00000000000..42505dccf35 --- /dev/null +++ b/2018/11xxx/CVE-2018-11462.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11462", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11463.json b/2018/11xxx/CVE-2018-11463.json new file mode 100644 index 00000000000..71b8c981d66 --- /dev/null +++ b/2018/11xxx/CVE-2018-11463.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11463", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11464.json b/2018/11xxx/CVE-2018-11464.json new file mode 100644 index 00000000000..c9bdbc235b4 --- /dev/null +++ b/2018/11xxx/CVE-2018-11464.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11464", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11465.json b/2018/11xxx/CVE-2018-11465.json new file mode 100644 index 00000000000..5ea33edc9ca --- /dev/null +++ b/2018/11xxx/CVE-2018-11465.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11465", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11466.json b/2018/11xxx/CVE-2018-11466.json new file mode 100644 index 00000000000..f8f3e806ce9 --- /dev/null +++ b/2018/11xxx/CVE-2018-11466.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11466", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11467.json b/2018/11xxx/CVE-2018-11467.json new file mode 100644 index 00000000000..b3b8e2bcdac --- /dev/null +++ b/2018/11xxx/CVE-2018-11467.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11467", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11468.json b/2018/11xxx/CVE-2018-11468.json new file mode 100644 index 00000000000..de17fdeadaf --- /dev/null +++ b/2018/11xxx/CVE-2018-11468.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11468", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "The __mkd_trim_line function in mkdio.c in libmarkdown.a in DISCOUNT 2.2.3a allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file, as demonstrated by mkd2html." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/Orc/discount/issues/189", + "refsource" : "MISC", + "url" : "https://github.com/Orc/discount/issues/189" + } + ] + } +} diff --git a/2018/6xxx/CVE-2018-6674.json b/2018/6xxx/CVE-2018-6674.json index 02598f458fb..f688e014473 100644 --- a/2018/6xxx/CVE-2018-6674.json +++ b/2018/6xxx/CVE-2018-6674.json @@ -1,87 +1,87 @@ { - "CVE_data_meta": { - "ASSIGNER": "psirt@mcafee.com", - "DATE_PUBLIC": "2018-05-09T17:00:00.000Z", - "ID": "CVE-2018-6674", - "STATE": "PUBLIC", - "TITLE": "SB10192 - Network Security Management (NSM) - Cross-Site Scripting (XSS) vulnerability" + "CVE_data_meta" : { + "ASSIGNER" : "psirt@mcafee.com", + "DATE_PUBLIC" : "2018-05-09T17:00:00.000Z", + "ID" : "CVE-2018-6674", + "STATE" : "PUBLIC", + "TITLE" : "SB10192 - Network Security Management (NSM) - Cross-Site Scripting (XSS) vulnerability" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": " VirusScan Enterprise (VSE)", - "version": { - "version_data": [ + "product_name" : " VirusScan Enterprise (VSE)", + "version" : { + "version_data" : [ { - "affected": "<", - "platform": "x86", - "version_name": "8.8", - "version_value": "8.8 Patch 11" + "affected" : "<", + "platform" : "x86", + "version_name" : "8.8", + "version_value" : "8.8 Patch 11" } ] } } ] }, - "vendor_name": "McAfee" + "vendor_name" : "McAfee" } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "Privilege Escalation vulnerability in Microsoft Windows client in McAfee VirusScan Enterprise (VSE) 8.8 allows local users to view configuration information in plain text format via the GUI or GUI terminal commands." + "lang" : "eng", + "value" : "Privilege Escalation vulnerability in Microsoft Windows client in McAfee VirusScan Enterprise (VSE) 8.8 allows local users to view configuration information in plain text format via the GUI or GUI terminal commands." } ] }, - "impact": { - "cvss": { - "attackComplexity": "HIGH", - "attackVector": "PHYSICAL", - "availabilityImpact": "HIGH", - "baseScore": 6.8, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "HIGH", - "scope": "CHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "HIGH", + "attackVector" : "PHYSICAL", + "availabilityImpact" : "HIGH", + "baseScore" : 6.8, + "baseSeverity" : "MEDIUM", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "privilegesRequired" : "HIGH", + "scope" : "CHANGED", + "userInteraction" : "REQUIRED", + "vectorString" : "CVSS:3.0/AV:P/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "Privilege Escalation vulnerability" + "lang" : "eng", + "value" : "Privilege Escalation vulnerability" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "name": "McAfee SB10237", - "refsource": "CONFIRM", - "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10237" + "name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10237", + "refsource" : "CONFIRM", + "url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10237" } ] }, - "source": { - "advisory": "SB10237", - "discovery": "EXTERNAL" + "source" : { + "advisory" : "SB10237", + "discovery" : "EXTERNAL" } }