diff --git a/2018/19xxx/CVE-2018-19455.json b/2018/19xxx/CVE-2018-19455.json new file mode 100644 index 00000000000..ea1f8ce8cad --- /dev/null +++ b/2018/19xxx/CVE-2018-19455.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19455", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19456.json b/2018/19xxx/CVE-2018-19456.json new file mode 100644 index 00000000000..b9ff85666ad --- /dev/null +++ b/2018/19xxx/CVE-2018-19456.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19456", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19457.json b/2018/19xxx/CVE-2018-19457.json new file mode 100644 index 00000000000..f7ad15fcd98 --- /dev/null +++ b/2018/19xxx/CVE-2018-19457.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19457", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Logicspice FAQ Script 2.9.7 allows uploading arbitrary files, which leads to remote command execution via admin/faqs/faqimages with a .php file." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "45326", + "refsource" : "EXPLOIT-DB", + "url" : "https://www.exploit-db.com/exploits/45326/" + }, + { + "name" : "https://pentest.com.tr/exploits/Logicspice-FAQ-Script-2-9-7-Remote-Code-Execution.html", + "refsource" : "MISC", + "url" : "https://pentest.com.tr/exploits/Logicspice-FAQ-Script-2-9-7-Remote-Code-Execution.html" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19458.json b/2018/19xxx/CVE-2018-19458.json new file mode 100644 index 00000000000..0f84a39320d --- /dev/null +++ b/2018/19xxx/CVE-2018-19458.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19458", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "In PHP Proxy 3.0.3, any user can read files from the server without authentication due to an index.php?q=file:/// LFI URI, a different vulnerability than CVE-2018-19246." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "45780", + "refsource" : "EXPLOIT-DB", + "url" : "https://www.exploit-db.com/exploits/45780/" + }, + { + "name" : "https://pentest.com.tr/exploits/PHP-Proxy-3-0-3-Local-File-Inclusion.html", + "refsource" : "MISC", + "url" : "https://pentest.com.tr/exploits/PHP-Proxy-3-0-3-Local-File-Inclusion.html" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19459.json b/2018/19xxx/CVE-2018-19459.json new file mode 100644 index 00000000000..247563546f6 --- /dev/null +++ b/2018/19xxx/CVE-2018-19459.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19459", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Adult Filter 1.0 has a Buffer Overflow via a crafted Black Domain List file." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "45687", + "refsource" : "EXPLOIT-DB", + "url" : "https://www.exploit-db.com/exploits/45687/" + }, + { + "name" : "https://pentest.com.tr/exploits/Adult-Filter-1-0-Buffer-Overflow-SEH.html", + "refsource" : "MISC", + "url" : "https://pentest.com.tr/exploits/Adult-Filter-1-0-Buffer-Overflow-SEH.html" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19460.json b/2018/19xxx/CVE-2018-19460.json new file mode 100644 index 00000000000..489df9a0c46 --- /dev/null +++ b/2018/19xxx/CVE-2018-19460.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19460", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}