From 405614c313fbb381bb254c14ddec9bbe91493f99 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 14 Oct 2018 22:05:24 -0400 Subject: [PATCH] - Synchronized data. --- 2018/18xxx/CVE-2018-18296.json | 48 +++++++++++++++++++++++- 2018/18xxx/CVE-2018-18307.json | 18 +++++++++ 2018/18xxx/CVE-2018-18308.json | 18 +++++++++ 2018/18xxx/CVE-2018-18309.json | 67 ++++++++++++++++++++++++++++++++++ 2018/18xxx/CVE-2018-18310.json | 67 ++++++++++++++++++++++++++++++++++ 5 files changed, 216 insertions(+), 2 deletions(-) create mode 100644 2018/18xxx/CVE-2018-18307.json create mode 100644 2018/18xxx/CVE-2018-18308.json create mode 100644 2018/18xxx/CVE-2018-18309.json create mode 100644 2018/18xxx/CVE-2018-18310.json diff --git a/2018/18xxx/CVE-2018-18296.json b/2018/18xxx/CVE-2018-18296.json index 4f371e62cd1..c5f1674eee4 100644 --- a/2018/18xxx/CVE-2018-18296.json +++ b/2018/18xxx/CVE-2018-18296.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-18296", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "MetInfo 6.1.2 has XSS via the /admin/index.php bigclass parameter in an n=column&a=doadd action." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "http://www.iwantacve.cn/index.php/archives/52/", + "refsource" : "MISC", + "url" : "http://www.iwantacve.cn/index.php/archives/52/" } ] } diff --git a/2018/18xxx/CVE-2018-18307.json b/2018/18xxx/CVE-2018-18307.json new file mode 100644 index 00000000000..7ba1a52c230 --- /dev/null +++ b/2018/18xxx/CVE-2018-18307.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18307", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18308.json b/2018/18xxx/CVE-2018-18308.json new file mode 100644 index 00000000000..af7baa26a1c --- /dev/null +++ b/2018/18xxx/CVE-2018-18308.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18308", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18309.json b/2018/18xxx/CVE-2018-18309.json new file mode 100644 index 00000000000..fbaaf37ffb5 --- /dev/null +++ b/2018/18xxx/CVE-2018-18309.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18309", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in the Binary File Descriptor (BFD) library (aka libbfd), as distributed in GNU Binutils 2.31. An invalid memory address dereference was discovered in read_reloc in reloc.c. The vulnerability causes a segmentation fault and application crash, which leads to denial of service, as demonstrated by objdump, because of missing _bfd_clear_contents bounds checking." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=23770", + "refsource" : "MISC", + "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=23770" + }, + { + "name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f", + "refsource" : "MISC", + "url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=0930cb3021b8078b34cf216e79eb8608d017864f" + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18310.json b/2018/18xxx/CVE-2018-18310.json new file mode 100644 index 00000000000..c65474f7c75 --- /dev/null +++ b/2018/18xxx/CVE-2018-18310.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18310", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An invalid memory address dereference was discovered in dwfl_segment_report_module.c in libdwfl in elfutils through v0.174. The vulnerability allows attackers to cause a denial of service (application crash) with a crafted ELF file, as demonstrated by consider_notes." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=23752", + "refsource" : "MISC", + "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=23752" + }, + { + "name" : "https://sourceware.org/ml/elfutils-devel/2018-q4/msg00022.html", + "refsource" : "MISC", + "url" : "https://sourceware.org/ml/elfutils-devel/2018-q4/msg00022.html" + } + ] + } +}