diff --git a/2018/3xxx/CVE-2018-3832.json b/2018/3xxx/CVE-2018-3832.json index db5341c9521..c3b17d2a81b 100644 --- a/2018/3xxx/CVE-2018-3832.json +++ b/2018/3xxx/CVE-2018-3832.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0511" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3833.json b/2018/3xxx/CVE-2018-3833.json index f6cd9a2aedb..47d1a206e09 100644 --- a/2018/3xxx/CVE-2018-3833.json +++ b/2018/3xxx/CVE-2018-3833.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0512" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.6, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3834.json b/2018/3xxx/CVE-2018-3834.json index c253aa78563..f4d8ee0b0a2 100644 --- a/2018/3xxx/CVE-2018-3834.json +++ b/2018/3xxx/CVE-2018-3834.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0513" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.7, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3835.json b/2018/3xxx/CVE-2018-3835.json index 29e47cada7c..bd836008de1 100644 --- a/2018/3xxx/CVE-2018-3835.json +++ b/2018/3xxx/CVE-2018-3835.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0515" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3836.json b/2018/3xxx/CVE-2018-3836.json index 2e04d1b59e1..03ebe34d9fd 100644 --- a/2018/3xxx/CVE-2018-3836.json +++ b/2018/3xxx/CVE-2018-3836.json @@ -64,5 +64,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0516" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3837.json b/2018/3xxx/CVE-2018-3837.json index fea5be7056d..e1c71080379 100644 --- a/2018/3xxx/CVE-2018-3837.json +++ b/2018/3xxx/CVE-2018-3837.json @@ -74,5 +74,13 @@ "url": "https://security.gentoo.org/glsa/201903-17" } ] + }, + "impact": { + "cvss": { + "baseScore": 5.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3838.json b/2018/3xxx/CVE-2018-3838.json index c655705e6d3..754a2e46e45 100644 --- a/2018/3xxx/CVE-2018-3838.json +++ b/2018/3xxx/CVE-2018-3838.json @@ -74,5 +74,13 @@ "url": "https://security.gentoo.org/glsa/201903-17" } ] + }, + "impact": { + "cvss": { + "baseScore": 5.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3839.json b/2018/3xxx/CVE-2018-3839.json index 55f73eb23f8..f39da245e07 100644 --- a/2018/3xxx/CVE-2018-3839.json +++ b/2018/3xxx/CVE-2018-3839.json @@ -74,5 +74,13 @@ "url": "https://security.gentoo.org/glsa/201903-17" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3840.json b/2018/3xxx/CVE-2018-3840.json index 040db0843ea..c1343281199 100644 --- a/2018/3xxx/CVE-2018-3840.json +++ b/2018/3xxx/CVE-2018-3840.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0523" } ] + }, + "impact": { + "cvss": { + "baseScore": 5.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3841.json b/2018/3xxx/CVE-2018-3841.json index 79398b2e74d..85644661fd3 100644 --- a/2018/3xxx/CVE-2018-3841.json +++ b/2018/3xxx/CVE-2018-3841.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0524" } ] + }, + "impact": { + "cvss": { + "baseScore": 5.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3842.json b/2018/3xxx/CVE-2018-3842.json index 799242d509c..aba69bfa8c3 100644 --- a/2018/3xxx/CVE-2018-3842.json +++ b/2018/3xxx/CVE-2018-3842.json @@ -69,5 +69,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0525" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3843.json b/2018/3xxx/CVE-2018-3843.json index 491c6fd47b8..a7914ead49e 100644 --- a/2018/3xxx/CVE-2018-3843.json +++ b/2018/3xxx/CVE-2018-3843.json @@ -69,5 +69,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0526" } ] + }, + "impact": { + "cvss": { + "baseScore": 6.5, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3844.json b/2018/3xxx/CVE-2018-3844.json index f76e071a5e8..01b796d1aaf 100644 --- a/2018/3xxx/CVE-2018-3844.json +++ b/2018/3xxx/CVE-2018-3844.json @@ -64,5 +64,13 @@ "url": "http://www.securityfocus.com/bid/104023" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3845.json b/2018/3xxx/CVE-2018-3845.json index 1ece588de8e..370b5ada5d8 100644 --- a/2018/3xxx/CVE-2018-3845.json +++ b/2018/3xxx/CVE-2018-3845.json @@ -64,5 +64,13 @@ "url": "http://www.securityfocus.com/bid/104023" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3846.json b/2018/3xxx/CVE-2018-3846.json index 9abb7233011..8203d2a66d2 100644 --- a/2018/3xxx/CVE-2018-3846.json +++ b/2018/3xxx/CVE-2018-3846.json @@ -69,5 +69,13 @@ "url": "https://security.gentoo.org/glsa/202101-24" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3847.json b/2018/3xxx/CVE-2018-3847.json index 159c64c1113..1efb7231536 100644 --- a/2018/3xxx/CVE-2018-3847.json +++ b/2018/3xxx/CVE-2018-3847.json @@ -64,5 +64,13 @@ "url": "https://security.gentoo.org/glsa/202101-24" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3848.json b/2018/3xxx/CVE-2018-3848.json index 089f9004966..cb013171fe1 100644 --- a/2018/3xxx/CVE-2018-3848.json +++ b/2018/3xxx/CVE-2018-3848.json @@ -69,5 +69,13 @@ "url": "https://security.gentoo.org/glsa/202101-24" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3849.json b/2018/3xxx/CVE-2018-3849.json index 0da16bafcfe..e5f838620cb 100644 --- a/2018/3xxx/CVE-2018-3849.json +++ b/2018/3xxx/CVE-2018-3849.json @@ -69,5 +69,13 @@ "url": "https://security.gentoo.org/glsa/202101-24" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3850.json b/2018/3xxx/CVE-2018-3850.json index bd6217904d2..c04035dc705 100644 --- a/2018/3xxx/CVE-2018-3850.json +++ b/2018/3xxx/CVE-2018-3850.json @@ -69,5 +69,13 @@ "url": "http://www.securityfocus.com/bid/103942" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3851.json b/2018/3xxx/CVE-2018-3851.json index bee176e1f80..13ade3e96ae 100644 --- a/2018/3xxx/CVE-2018-3851.json +++ b/2018/3xxx/CVE-2018-3851.json @@ -64,5 +64,13 @@ "url": "http://www.securityfocus.com/bid/104023" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3852.json b/2018/3xxx/CVE-2018-3852.json index 220af228251..499fa686f4e 100644 --- a/2018/3xxx/CVE-2018-3852.json +++ b/2018/3xxx/CVE-2018-3852.json @@ -64,5 +64,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0535" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3853.json b/2018/3xxx/CVE-2018-3853.json index 04042deddb1..1e889301256 100644 --- a/2018/3xxx/CVE-2018-3853.json +++ b/2018/3xxx/CVE-2018-3853.json @@ -69,5 +69,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0536" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3854.json b/2018/3xxx/CVE-2018-3854.json index b729c3e4c78..d51f06ac37e 100644 --- a/2018/3xxx/CVE-2018-3854.json +++ b/2018/3xxx/CVE-2018-3854.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0537" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3855.json b/2018/3xxx/CVE-2018-3855.json index 4c82af4b6fd..5a662782e65 100644 --- a/2018/3xxx/CVE-2018-3855.json +++ b/2018/3xxx/CVE-2018-3855.json @@ -64,5 +64,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0538" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3856.json b/2018/3xxx/CVE-2018-3856.json index 8e6d296472b..3205476e005 100644 --- a/2018/3xxx/CVE-2018-3856.json +++ b/2018/3xxx/CVE-2018-3856.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0539" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3857.json b/2018/3xxx/CVE-2018-3857.json index 5224a55e78a..cde488e52c3 100644 --- a/2018/3xxx/CVE-2018-3857.json +++ b/2018/3xxx/CVE-2018-3857.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0541" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3858.json b/2018/3xxx/CVE-2018-3858.json index 7baa5d69a2a..b7c1cc6aeda 100644 --- a/2018/3xxx/CVE-2018-3858.json +++ b/2018/3xxx/CVE-2018-3858.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0542" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3859.json b/2018/3xxx/CVE-2018-3859.json index 6ab63c6ba69..df11fe3bd24 100644 --- a/2018/3xxx/CVE-2018-3859.json +++ b/2018/3xxx/CVE-2018-3859.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0543" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3860.json b/2018/3xxx/CVE-2018-3860.json index 4ba0656d9e5..bb46b8a9214 100644 --- a/2018/3xxx/CVE-2018-3860.json +++ b/2018/3xxx/CVE-2018-3860.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0544" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3861.json b/2018/3xxx/CVE-2018-3861.json index 70c263ae2cc..e508731cbee 100644 --- a/2018/3xxx/CVE-2018-3861.json +++ b/2018/3xxx/CVE-2018-3861.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0546" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3862.json b/2018/3xxx/CVE-2018-3862.json index d522c268182..ee308d97eba 100644 --- a/2018/3xxx/CVE-2018-3862.json +++ b/2018/3xxx/CVE-2018-3862.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0547" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3863.json b/2018/3xxx/CVE-2018-3863.json index 4b6cab53c3a..38d50315d51 100644 --- a/2018/3xxx/CVE-2018-3863.json +++ b/2018/3xxx/CVE-2018-3863.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0548" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3864.json b/2018/3xxx/CVE-2018-3864.json index c40e0fa9ae8..2b1493e9283 100644 --- a/2018/3xxx/CVE-2018-3864.json +++ b/2018/3xxx/CVE-2018-3864.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0548" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3865.json b/2018/3xxx/CVE-2018-3865.json index f51edfb8532..f838bcee4da 100644 --- a/2018/3xxx/CVE-2018-3865.json +++ b/2018/3xxx/CVE-2018-3865.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0548" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3866.json b/2018/3xxx/CVE-2018-3866.json index 589088a0a87..04b6d716f0c 100644 --- a/2018/3xxx/CVE-2018-3866.json +++ b/2018/3xxx/CVE-2018-3866.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0548" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3867.json b/2018/3xxx/CVE-2018-3867.json index 8a3b99217be..f312dc8179d 100644 --- a/2018/3xxx/CVE-2018-3867.json +++ b/2018/3xxx/CVE-2018-3867.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0549" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3868.json b/2018/3xxx/CVE-2018-3868.json index 4f366ac7206..56652161f70 100644 --- a/2018/3xxx/CVE-2018-3868.json +++ b/2018/3xxx/CVE-2018-3868.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0550" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3870.json b/2018/3xxx/CVE-2018-3870.json index a994913791d..8b18418aba4 100644 --- a/2018/3xxx/CVE-2018-3870.json +++ b/2018/3xxx/CVE-2018-3870.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0552" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3871.json b/2018/3xxx/CVE-2018-3871.json index 844983f0b5c..ab258784f65 100644 --- a/2018/3xxx/CVE-2018-3871.json +++ b/2018/3xxx/CVE-2018-3871.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0553" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3872.json b/2018/3xxx/CVE-2018-3872.json index d7a743ef949..4453dbe156e 100644 --- a/2018/3xxx/CVE-2018-3872.json +++ b/2018/3xxx/CVE-2018-3872.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0554" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3873.json b/2018/3xxx/CVE-2018-3873.json index d0fd48b163f..bf43827f855 100644 --- a/2018/3xxx/CVE-2018-3873.json +++ b/2018/3xxx/CVE-2018-3873.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3874.json b/2018/3xxx/CVE-2018-3874.json index 16b175be647..0784e58c320 100644 --- a/2018/3xxx/CVE-2018-3874.json +++ b/2018/3xxx/CVE-2018-3874.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3875.json b/2018/3xxx/CVE-2018-3875.json index af7a84815fd..1a0256d3b67 100644 --- a/2018/3xxx/CVE-2018-3875.json +++ b/2018/3xxx/CVE-2018-3875.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3876.json b/2018/3xxx/CVE-2018-3876.json index 012ca1d6863..2e9dbad4c4f 100644 --- a/2018/3xxx/CVE-2018-3876.json +++ b/2018/3xxx/CVE-2018-3876.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3877.json b/2018/3xxx/CVE-2018-3877.json index deddbe5483b..4eac6a8ef0a 100644 --- a/2018/3xxx/CVE-2018-3877.json +++ b/2018/3xxx/CVE-2018-3877.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0555" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3878.json b/2018/3xxx/CVE-2018-3878.json index 6c2ed8ad0b0..3750de3781f 100644 --- a/2018/3xxx/CVE-2018-3878.json +++ b/2018/3xxx/CVE-2018-3878.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0555" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3879.json b/2018/3xxx/CVE-2018-3879.json index d066b665eb2..3dc31347b49 100644 --- a/2018/3xxx/CVE-2018-3879.json +++ b/2018/3xxx/CVE-2018-3879.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0556" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3880.json b/2018/3xxx/CVE-2018-3880.json index 44701918bf7..8c6cd780734 100644 --- a/2018/3xxx/CVE-2018-3880.json +++ b/2018/3xxx/CVE-2018-3880.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0557" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3881.json b/2018/3xxx/CVE-2018-3881.json index f43192dc954..bf6ad2f04c4 100644 --- a/2018/3xxx/CVE-2018-3881.json +++ b/2018/3xxx/CVE-2018-3881.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0559" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.4, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3882.json b/2018/3xxx/CVE-2018-3882.json index 6a17167902f..26ec6c16e4d 100644 --- a/2018/3xxx/CVE-2018-3882.json +++ b/2018/3xxx/CVE-2018-3882.json @@ -58,5 +58,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560" } ] + }, + "impact": { + "cvss": { + "baseScore": 5.4, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3883.json b/2018/3xxx/CVE-2018-3883.json index 2807c00e424..690092db1c0 100644 --- a/2018/3xxx/CVE-2018-3883.json +++ b/2018/3xxx/CVE-2018-3883.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560" } ] + }, + "impact": { + "cvss": { + "baseScore": 5.4, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3884.json b/2018/3xxx/CVE-2018-3884.json index 01d4f33fdd3..ce589fbef13 100644 --- a/2018/3xxx/CVE-2018-3884.json +++ b/2018/3xxx/CVE-2018-3884.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560" } ] + }, + "impact": { + "cvss": { + "baseScore": 5.4, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3885.json b/2018/3xxx/CVE-2018-3885.json index b2d7729f65a..bed0c1aee7f 100644 --- a/2018/3xxx/CVE-2018-3885.json +++ b/2018/3xxx/CVE-2018-3885.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0560" } ] + }, + "impact": { + "cvss": { + "baseScore": 5.4, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3886.json b/2018/3xxx/CVE-2018-3886.json index bb0226c0e75..228e12b5e2d 100644 --- a/2018/3xxx/CVE-2018-3886.json +++ b/2018/3xxx/CVE-2018-3886.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0561" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3887.json b/2018/3xxx/CVE-2018-3887.json index 437f5316f56..c40e3f3ec55 100644 --- a/2018/3xxx/CVE-2018-3887.json +++ b/2018/3xxx/CVE-2018-3887.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0562" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3888.json b/2018/3xxx/CVE-2018-3888.json index 64409dcd0e1..01ddbf685d0 100644 --- a/2018/3xxx/CVE-2018-3888.json +++ b/2018/3xxx/CVE-2018-3888.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0563" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3889.json b/2018/3xxx/CVE-2018-3889.json index dcef823a2dc..1a35664750c 100644 --- a/2018/3xxx/CVE-2018-3889.json +++ b/2018/3xxx/CVE-2018-3889.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0564" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3890.json b/2018/3xxx/CVE-2018-3890.json index f58cd2a6162..fd2187a5364 100644 --- a/2018/3xxx/CVE-2018-3890.json +++ b/2018/3xxx/CVE-2018-3890.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0565" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.6, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3891.json b/2018/3xxx/CVE-2018-3891.json index ce131e04bba..56d1dc9b9d6 100644 --- a/2018/3xxx/CVE-2018-3891.json +++ b/2018/3xxx/CVE-2018-3891.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0566" } ] + }, + "impact": { + "cvss": { + "baseScore": 5.7, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3892.json b/2018/3xxx/CVE-2018-3892.json index 2317647fe06..bc1685a6673 100644 --- a/2018/3xxx/CVE-2018-3892.json +++ b/2018/3xxx/CVE-2018-3892.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0567" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.6, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3893.json b/2018/3xxx/CVE-2018-3893.json index e15eb72f7e2..5ab1ac97ea1 100644 --- a/2018/3xxx/CVE-2018-3893.json +++ b/2018/3xxx/CVE-2018-3893.json @@ -58,5 +58,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3894.json b/2018/3xxx/CVE-2018-3894.json index 3f589bad853..40d91f5e27c 100644 --- a/2018/3xxx/CVE-2018-3894.json +++ b/2018/3xxx/CVE-2018-3894.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3895.json b/2018/3xxx/CVE-2018-3895.json index 76a65e18285..0ef692b1cc7 100644 --- a/2018/3xxx/CVE-2018-3895.json +++ b/2018/3xxx/CVE-2018-3895.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3896.json b/2018/3xxx/CVE-2018-3896.json index 18386fdf892..c522aa4ab4a 100644 --- a/2018/3xxx/CVE-2018-3896.json +++ b/2018/3xxx/CVE-2018-3896.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3897.json b/2018/3xxx/CVE-2018-3897.json index 8010f8304fe..b24fce8695f 100644 --- a/2018/3xxx/CVE-2018-3897.json +++ b/2018/3xxx/CVE-2018-3897.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0570" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3898.json b/2018/3xxx/CVE-2018-3898.json index eb15c9f5d36..5fee01cb447 100644 --- a/2018/3xxx/CVE-2018-3898.json +++ b/2018/3xxx/CVE-2018-3898.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0571" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.3, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3899.json b/2018/3xxx/CVE-2018-3899.json index 851e33478ee..0041c7d291b 100644 --- a/2018/3xxx/CVE-2018-3899.json +++ b/2018/3xxx/CVE-2018-3899.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0571" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.3, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3900.json b/2018/3xxx/CVE-2018-3900.json index 36c323dea71..65163c0a742 100644 --- a/2018/3xxx/CVE-2018-3900.json +++ b/2018/3xxx/CVE-2018-3900.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0572" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.1, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3902.json b/2018/3xxx/CVE-2018-3902.json index 1258c22201c..cef6120c6b7 100644 --- a/2018/3xxx/CVE-2018-3902.json +++ b/2018/3xxx/CVE-2018-3902.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0573" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3903.json b/2018/3xxx/CVE-2018-3903.json index 726e83dcef5..959cec117e0 100644 --- a/2018/3xxx/CVE-2018-3903.json +++ b/2018/3xxx/CVE-2018-3903.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0574" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3904.json b/2018/3xxx/CVE-2018-3904.json index c6e79efcf86..97c85ea5458 100644 --- a/2018/3xxx/CVE-2018-3904.json +++ b/2018/3xxx/CVE-2018-3904.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0574" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.9, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3905.json b/2018/3xxx/CVE-2018-3905.json index 1551b44730e..bad9f6698b0 100644 --- a/2018/3xxx/CVE-2018-3905.json +++ b/2018/3xxx/CVE-2018-3905.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0575" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3906.json b/2018/3xxx/CVE-2018-3906.json index 643809747b0..cccdf5ebc11 100644 --- a/2018/3xxx/CVE-2018-3906.json +++ b/2018/3xxx/CVE-2018-3906.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0576" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3907.json b/2018/3xxx/CVE-2018-3907.json index a8526bcecfc..e91b573e8cb 100644 --- a/2018/3xxx/CVE-2018-3907.json +++ b/2018/3xxx/CVE-2018-3907.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0577" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.1, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3908.json b/2018/3xxx/CVE-2018-3908.json index f41b559637b..95f180b9ba1 100644 --- a/2018/3xxx/CVE-2018-3908.json +++ b/2018/3xxx/CVE-2018-3908.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0577" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.1, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3909.json b/2018/3xxx/CVE-2018-3909.json index 8fd163cb091..461499f93e0 100644 --- a/2018/3xxx/CVE-2018-3909.json +++ b/2018/3xxx/CVE-2018-3909.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0577" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.1, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3910.json b/2018/3xxx/CVE-2018-3910.json index 203c0ec6030..2fd07c5ca57 100644 --- a/2018/3xxx/CVE-2018-3910.json +++ b/2018/3xxx/CVE-2018-3910.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0580" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:N/UI:R/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3911.json b/2018/3xxx/CVE-2018-3911.json index 985f019a47e..3873063530b 100644 --- a/2018/3xxx/CVE-2018-3911.json +++ b/2018/3xxx/CVE-2018-3911.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0578" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.6, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3912.json b/2018/3xxx/CVE-2018-3912.json index 2839ee6f74b..82f43f7a32b 100644 --- a/2018/3xxx/CVE-2018-3912.json +++ b/2018/3xxx/CVE-2018-3912.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0581" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3913.json b/2018/3xxx/CVE-2018-3913.json index 252778b9988..adbf2449007 100644 --- a/2018/3xxx/CVE-2018-3913.json +++ b/2018/3xxx/CVE-2018-3913.json @@ -58,5 +58,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3914.json b/2018/3xxx/CVE-2018-3914.json index 8d3660320cd..31c73be322e 100644 --- a/2018/3xxx/CVE-2018-3914.json +++ b/2018/3xxx/CVE-2018-3914.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3915.json b/2018/3xxx/CVE-2018-3915.json index e013352e1fb..6810d202514 100644 --- a/2018/3xxx/CVE-2018-3915.json +++ b/2018/3xxx/CVE-2018-3915.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3916.json b/2018/3xxx/CVE-2018-3916.json index 8f75078b4f5..4c0e2ab6591 100644 --- a/2018/3xxx/CVE-2018-3916.json +++ b/2018/3xxx/CVE-2018-3916.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0581" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3917.json b/2018/3xxx/CVE-2018-3917.json index dc0acc0b68b..b0d353e341b 100644 --- a/2018/3xxx/CVE-2018-3917.json +++ b/2018/3xxx/CVE-2018-3917.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0581" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3918.json b/2018/3xxx/CVE-2018-3918.json index e4ea8d749da..e93f8ed2437 100644 --- a/2018/3xxx/CVE-2018-3918.json +++ b/2018/3xxx/CVE-2018-3918.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0582" } ] + }, + "impact": { + "cvss": { + "baseScore": 6.5, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3919.json b/2018/3xxx/CVE-2018-3919.json index 17b6dc409c3..321916b90b5 100644 --- a/2018/3xxx/CVE-2018-3919.json +++ b/2018/3xxx/CVE-2018-3919.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0583" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3920.json b/2018/3xxx/CVE-2018-3920.json index 890e44440c6..02a73f5ab4c 100644 --- a/2018/3xxx/CVE-2018-3920.json +++ b/2018/3xxx/CVE-2018-3920.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0584" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.6, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:P/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3921.json b/2018/3xxx/CVE-2018-3921.json index 4ccd6bb16f6..3c6d5d18be6 100644 --- a/2018/3xxx/CVE-2018-3921.json +++ b/2018/3xxx/CVE-2018-3921.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0585" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3922.json b/2018/3xxx/CVE-2018-3922.json index bed4ee066c4..974dea4490f 100644 --- a/2018/3xxx/CVE-2018-3922.json +++ b/2018/3xxx/CVE-2018-3922.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0586" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3923.json b/2018/3xxx/CVE-2018-3923.json index f6823f1c5bd..dd4f413cb5b 100644 --- a/2018/3xxx/CVE-2018-3923.json +++ b/2018/3xxx/CVE-2018-3923.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0587" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3924.json b/2018/3xxx/CVE-2018-3924.json index 3f9a7fc5d0b..6eda41d3fc6 100644 --- a/2018/3xxx/CVE-2018-3924.json +++ b/2018/3xxx/CVE-2018-3924.json @@ -64,5 +64,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0588" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3925.json b/2018/3xxx/CVE-2018-3925.json index faddd889670..895cacbe269 100644 --- a/2018/3xxx/CVE-2018-3925.json +++ b/2018/3xxx/CVE-2018-3925.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0591" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3926.json b/2018/3xxx/CVE-2018-3926.json index fc7bc935544..d09674d388b 100644 --- a/2018/3xxx/CVE-2018-3926.json +++ b/2018/3xxx/CVE-2018-3926.json @@ -64,5 +64,13 @@ "url": "http://www.securityfocus.com/bid/105162" } ] + }, + "impact": { + "cvss": { + "baseScore": 5.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3927.json b/2018/3xxx/CVE-2018-3927.json index b66c47c1d19..3b40b12e22f 100644 --- a/2018/3xxx/CVE-2018-3927.json +++ b/2018/3xxx/CVE-2018-3927.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0594" } ] + }, + "impact": { + "cvss": { + "baseScore": 6.8, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3928.json b/2018/3xxx/CVE-2018-3928.json index ada9ab9c08e..c6e840b7f38 100644 --- a/2018/3xxx/CVE-2018-3928.json +++ b/2018/3xxx/CVE-2018-3928.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0595" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3929.json b/2018/3xxx/CVE-2018-3929.json index 4b69e3234be..186a381ca12 100644 --- a/2018/3xxx/CVE-2018-3929.json +++ b/2018/3xxx/CVE-2018-3929.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0596" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3930.json b/2018/3xxx/CVE-2018-3930.json index f821928dd55..28c3aa597e5 100644 --- a/2018/3xxx/CVE-2018-3930.json +++ b/2018/3xxx/CVE-2018-3930.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0597" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3931.json b/2018/3xxx/CVE-2018-3931.json index 43374bf6cf7..cf107aa1ffe 100644 --- a/2018/3xxx/CVE-2018-3931.json +++ b/2018/3xxx/CVE-2018-3931.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0598" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3932.json b/2018/3xxx/CVE-2018-3932.json index 70746b62dbc..4be5c743e03 100644 --- a/2018/3xxx/CVE-2018-3932.json +++ b/2018/3xxx/CVE-2018-3932.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0599" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3933.json b/2018/3xxx/CVE-2018-3933.json index 1f2c80c8c4d..a10b35c5714 100644 --- a/2018/3xxx/CVE-2018-3933.json +++ b/2018/3xxx/CVE-2018-3933.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0600" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3934.json b/2018/3xxx/CVE-2018-3934.json index bd9f02a7daa..b792b724855 100644 --- a/2018/3xxx/CVE-2018-3934.json +++ b/2018/3xxx/CVE-2018-3934.json @@ -58,5 +58,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0601" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.0, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3935.json b/2018/3xxx/CVE-2018-3935.json index 2a36a37b7ee..0dac7fd64dc 100644 --- a/2018/3xxx/CVE-2018-3935.json +++ b/2018/3xxx/CVE-2018-3935.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0602" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3936.json b/2018/3xxx/CVE-2018-3936.json index 6b5e1fedac4..b4674b74b7c 100644 --- a/2018/3xxx/CVE-2018-3936.json +++ b/2018/3xxx/CVE-2018-3936.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0603" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3937.json b/2018/3xxx/CVE-2018-3937.json index 944f524e9a6..ff2c68cd534 100644 --- a/2018/3xxx/CVE-2018-3937.json +++ b/2018/3xxx/CVE-2018-3937.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0604" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.1, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3938.json b/2018/3xxx/CVE-2018-3938.json index ccbb79114d8..17b5a302db6 100644 --- a/2018/3xxx/CVE-2018-3938.json +++ b/2018/3xxx/CVE-2018-3938.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0605" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.1, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3939.json b/2018/3xxx/CVE-2018-3939.json index d2271cc2c9d..396367db6f3 100644 --- a/2018/3xxx/CVE-2018-3939.json +++ b/2018/3xxx/CVE-2018-3939.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0606" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3940.json b/2018/3xxx/CVE-2018-3940.json index c018d11a816..73844780578 100644 --- a/2018/3xxx/CVE-2018-3940.json +++ b/2018/3xxx/CVE-2018-3940.json @@ -64,5 +64,13 @@ "url": "http://www.securitytracker.com/id/1041769" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3941.json b/2018/3xxx/CVE-2018-3941.json index b84d7692d38..ac598e7ddc6 100644 --- a/2018/3xxx/CVE-2018-3941.json +++ b/2018/3xxx/CVE-2018-3941.json @@ -64,5 +64,13 @@ "url": "http://www.securitytracker.com/id/1041769" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3942.json b/2018/3xxx/CVE-2018-3942.json index 396f3edff2e..ca88163f50e 100644 --- a/2018/3xxx/CVE-2018-3942.json +++ b/2018/3xxx/CVE-2018-3942.json @@ -64,5 +64,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0609" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3943.json b/2018/3xxx/CVE-2018-3943.json index 6ad1843cef7..25a4576f657 100644 --- a/2018/3xxx/CVE-2018-3943.json +++ b/2018/3xxx/CVE-2018-3943.json @@ -64,5 +64,13 @@ "url": "http://www.securitytracker.com/id/1041769" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3944.json b/2018/3xxx/CVE-2018-3944.json index 19724277be1..a6dd05c2f3f 100644 --- a/2018/3xxx/CVE-2018-3944.json +++ b/2018/3xxx/CVE-2018-3944.json @@ -64,5 +64,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0611" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3945.json b/2018/3xxx/CVE-2018-3945.json index 5e37da24d5f..f4d33d0a84c 100644 --- a/2018/3xxx/CVE-2018-3945.json +++ b/2018/3xxx/CVE-2018-3945.json @@ -64,5 +64,13 @@ "url": "http://www.securitytracker.com/id/1041769" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3946.json b/2018/3xxx/CVE-2018-3946.json index 22d7b3bc7d1..9b0c3ffe416 100644 --- a/2018/3xxx/CVE-2018-3946.json +++ b/2018/3xxx/CVE-2018-3946.json @@ -64,5 +64,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0613" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3947.json b/2018/3xxx/CVE-2018-3947.json index 4ecdf5e4b20..33fc27d66f2 100644 --- a/2018/3xxx/CVE-2018-3947.json +++ b/2018/3xxx/CVE-2018-3947.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0616" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.0, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3948.json b/2018/3xxx/CVE-2018-3948.json index b8534507665..51f0aabf3d0 100644 --- a/2018/3xxx/CVE-2018-3948.json +++ b/2018/3xxx/CVE-2018-3948.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0617" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3949.json b/2018/3xxx/CVE-2018-3949.json index 68471b1c25b..44bbbaa0ff6 100644 --- a/2018/3xxx/CVE-2018-3949.json +++ b/2018/3xxx/CVE-2018-3949.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0618" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3950.json b/2018/3xxx/CVE-2018-3950.json index 9ef2ca97b46..d0b585997e7 100644 --- a/2018/3xxx/CVE-2018-3950.json +++ b/2018/3xxx/CVE-2018-3950.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0619" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3951.json b/2018/3xxx/CVE-2018-3951.json index 1fc686137c1..71d2e6028da 100644 --- a/2018/3xxx/CVE-2018-3951.json +++ b/2018/3xxx/CVE-2018-3951.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0620" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3952.json b/2018/3xxx/CVE-2018-3952.json index 1b196a45df6..c0dffac962e 100644 --- a/2018/3xxx/CVE-2018-3952.json +++ b/2018/3xxx/CVE-2018-3952.json @@ -64,5 +64,13 @@ "url": "http://www.securityfocus.com/bid/105312" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3953.json b/2018/3xxx/CVE-2018-3953.json index ff2cf934b22..949ab393098 100644 --- a/2018/3xxx/CVE-2018-3953.json +++ b/2018/3xxx/CVE-2018-3953.json @@ -69,5 +69,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0625" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3954.json b/2018/3xxx/CVE-2018-3954.json index ef19098392b..8141030b11d 100644 --- a/2018/3xxx/CVE-2018-3954.json +++ b/2018/3xxx/CVE-2018-3954.json @@ -69,5 +69,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0625" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3955.json b/2018/3xxx/CVE-2018-3955.json index 49942775e97..015acdc7c0e 100644 --- a/2018/3xxx/CVE-2018-3955.json +++ b/2018/3xxx/CVE-2018-3955.json @@ -69,5 +69,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0625" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3956.json b/2018/3xxx/CVE-2018-3956.json index 104a8c8588c..b5944554d19 100644 --- a/2018/3xxx/CVE-2018-3956.json +++ b/2018/3xxx/CVE-2018-3956.json @@ -59,5 +59,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0626" } ] + }, + "impact": { + "cvss": { + "baseScore": 6.8, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3957.json b/2018/3xxx/CVE-2018-3957.json index 75aaef8356d..f42849da4df 100644 --- a/2018/3xxx/CVE-2018-3957.json +++ b/2018/3xxx/CVE-2018-3957.json @@ -64,5 +64,13 @@ "url": "http://www.securitytracker.com/id/1041769" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3958.json b/2018/3xxx/CVE-2018-3958.json index 1cdf3024b0d..66b78ffd944 100644 --- a/2018/3xxx/CVE-2018-3958.json +++ b/2018/3xxx/CVE-2018-3958.json @@ -64,5 +64,13 @@ "url": "http://www.securitytracker.com/id/1041769" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3959.json b/2018/3xxx/CVE-2018-3959.json index 77587219673..197ccbf8dce 100644 --- a/2018/3xxx/CVE-2018-3959.json +++ b/2018/3xxx/CVE-2018-3959.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3960.json b/2018/3xxx/CVE-2018-3960.json index 7497b6cf8cf..a34d06bcc01 100644 --- a/2018/3xxx/CVE-2018-3960.json +++ b/2018/3xxx/CVE-2018-3960.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3961.json b/2018/3xxx/CVE-2018-3961.json index 7650cd070d4..d124793eaa0 100644 --- a/2018/3xxx/CVE-2018-3961.json +++ b/2018/3xxx/CVE-2018-3961.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3962.json b/2018/3xxx/CVE-2018-3962.json index 6338368f638..34121742fd2 100644 --- a/2018/3xxx/CVE-2018-3962.json +++ b/2018/3xxx/CVE-2018-3962.json @@ -64,5 +64,13 @@ "url": "http://www.securitytracker.com/id/1041769" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3963.json b/2018/3xxx/CVE-2018-3963.json index cecadee2cef..7a0ad5d9098 100644 --- a/2018/3xxx/CVE-2018-3963.json +++ b/2018/3xxx/CVE-2018-3963.json @@ -58,5 +58,13 @@ "value": "An exploitable command injection vulnerability exists in the DHCP daemon configuration of the CUJO Smart Firewall. When adding a new static DHCP address, its corresponding hostname is inserted into the dhcpd.conf file without prior sanitization, allowing for arbitrary execution of system commands. To trigger this vulnerability, an attacker can send a DHCP request message and set up the corresponding static DHCP entry." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.0, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3964.json b/2018/3xxx/CVE-2018-3964.json index fdd1c6daf35..70a0a20b27b 100644 --- a/2018/3xxx/CVE-2018-3964.json +++ b/2018/3xxx/CVE-2018-3964.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0629" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3965.json b/2018/3xxx/CVE-2018-3965.json index 5b2517ce9e8..b7ae4a11fdc 100644 --- a/2018/3xxx/CVE-2018-3965.json +++ b/2018/3xxx/CVE-2018-3965.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0630" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3966.json b/2018/3xxx/CVE-2018-3966.json index 8812c6a82d4..bbd7f3628b7 100644 --- a/2018/3xxx/CVE-2018-3966.json +++ b/2018/3xxx/CVE-2018-3966.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0631" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3967.json b/2018/3xxx/CVE-2018-3967.json index 16428ccd875..6a4585c242f 100644 --- a/2018/3xxx/CVE-2018-3967.json +++ b/2018/3xxx/CVE-2018-3967.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0632" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3968.json b/2018/3xxx/CVE-2018-3968.json index 65b31b01726..2238000b07a 100644 --- a/2018/3xxx/CVE-2018-3968.json +++ b/2018/3xxx/CVE-2018-3968.json @@ -58,5 +58,13 @@ "value": "An exploitable vulnerability exists in the verified boot protection of the Das U-Boot from version 2013.07-rc1 to 2014.07-rc2. The affected versions lack proper FIT signature enforcement, which allows an attacker to bypass U-Boot's verified boot and execute an unsigned kernel, embedded in a legacy image format. To trigger this vulnerability, a local attacker needs to be able to supply the image to boot." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3969.json b/2018/3xxx/CVE-2018-3969.json index 58975dd280a..727065d9067 100644 --- a/2018/3xxx/CVE-2018-3969.json +++ b/2018/3xxx/CVE-2018-3969.json @@ -58,5 +58,13 @@ "value": "An exploitable vulnerability exists in the verified boot protection of the CUJO Smart Firewall. It is possible to add arbitrary shell commands into the dhcpd.conf file, that persist across reboots and firmware updates, and thus allow for executing unverified commands. To trigger this vulnerability, a local attacker needs to be able to write into /config/dhcpd.conf." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3970.json b/2018/3xxx/CVE-2018-3970.json index b9531fbe742..2c43be78469 100644 --- a/2018/3xxx/CVE-2018-3970.json +++ b/2018/3xxx/CVE-2018-3970.json @@ -64,5 +64,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0635" } ] + }, + "impact": { + "cvss": { + "baseScore": 4.0, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3971.json b/2018/3xxx/CVE-2018-3971.json index b5707dcab97..11692d2d31a 100644 --- a/2018/3xxx/CVE-2018-3971.json +++ b/2018/3xxx/CVE-2018-3971.json @@ -64,5 +64,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0636" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.3, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3972.json b/2018/3xxx/CVE-2018-3972.json index fd3db7204ed..b57eaa64288 100644 --- a/2018/3xxx/CVE-2018-3972.json +++ b/2018/3xxx/CVE-2018-3972.json @@ -64,5 +64,13 @@ "url": "https://blog.talosintelligence.com/2018/09/epee-levin-vuln.html" } ] + }, + "impact": { + "cvss": { + "baseScore": 10.0, + "baseSeverity": null, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3973.json b/2018/3xxx/CVE-2018-3973.json index 5ce98fd98ca..98a4ed861a3 100644 --- a/2018/3xxx/CVE-2018-3973.json +++ b/2018/3xxx/CVE-2018-3973.json @@ -64,5 +64,13 @@ "url": "http://www.securityfocus.com/bid/106809" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3974.json b/2018/3xxx/CVE-2018-3974.json index f5762e860a2..d8ba08a5759 100644 --- a/2018/3xxx/CVE-2018-3974.json +++ b/2018/3xxx/CVE-2018-3974.json @@ -58,5 +58,13 @@ "value": "An exploitable local privilege elevation vulnerability exists in the file system permissions of GOG Galaxy's install directory. An attacker can overwrite an executable that is launched as a system service on boot by default to exploit this vulnerability and execute arbitrary code with system privileges." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.3, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3975.json b/2018/3xxx/CVE-2018-3975.json index 451164460c6..39f5c62ab74 100644 --- a/2018/3xxx/CVE-2018-3975.json +++ b/2018/3xxx/CVE-2018-3975.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0641" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3976.json b/2018/3xxx/CVE-2018-3976.json index dae9ba83366..1ed349be331 100644 --- a/2018/3xxx/CVE-2018-3976.json +++ b/2018/3xxx/CVE-2018-3976.json @@ -64,5 +64,13 @@ "url": "http://www.securityfocus.com/bid/106809" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3977.json b/2018/3xxx/CVE-2018-3977.json index 8a50ad56517..f118f876bc3 100644 --- a/2018/3xxx/CVE-2018-3977.json +++ b/2018/3xxx/CVE-2018-3977.json @@ -79,5 +79,13 @@ "url": "https://usn.ubuntu.com/4238-1/" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3978.json b/2018/3xxx/CVE-2018-3978.json index 70d81e03702..c795c39f540 100644 --- a/2018/3xxx/CVE-2018-3978.json +++ b/2018/3xxx/CVE-2018-3978.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0646" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3979.json b/2018/3xxx/CVE-2018-3979.json index 7b520ee67d6..aece7901810 100644 --- a/2018/3xxx/CVE-2018-3979.json +++ b/2018/3xxx/CVE-2018-3979.json @@ -61,5 +61,13 @@ "value": "A remote denial-of-service vulnerability exists in the way the Nouveau Display Driver (the default Ubuntu Nvidia display driver) handles GPU shader execution. A specially crafted pixel shader can cause remote denial-of-service issues. An attacker can provide a specially crafted website to trigger this vulnerability. This vulnerability can be triggered remotely after the user visits a malformed website. No further user interaction is required. Vulnerable versions include Ubuntu 18.04 LTS (linux 4.15.0-29-generic x86_64), Nouveau Display Driver NV117 (vermagic: 4.15.0-29-generic SMP mod_unload)." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.4, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3980.json b/2018/3xxx/CVE-2018-3980.json index 5fd7ec45793..b66fee44790 100644 --- a/2018/3xxx/CVE-2018-3980.json +++ b/2018/3xxx/CVE-2018-3980.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0648" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3981.json b/2018/3xxx/CVE-2018-3981.json index fa1e83d0f4b..d1e826d2061 100644 --- a/2018/3xxx/CVE-2018-3981.json +++ b/2018/3xxx/CVE-2018-3981.json @@ -69,5 +69,13 @@ "url": "http://www.securityfocus.com/bid/106809" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3982.json b/2018/3xxx/CVE-2018-3982.json index de99989ca44..d62af2a91fa 100644 --- a/2018/3xxx/CVE-2018-3982.json +++ b/2018/3xxx/CVE-2018-3982.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0650" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3983.json b/2018/3xxx/CVE-2018-3983.json index 10da615c582..9a7f1b73fb2 100644 --- a/2018/3xxx/CVE-2018-3983.json +++ b/2018/3xxx/CVE-2018-3983.json @@ -58,5 +58,13 @@ "value": "An exploitable uninitialized pointer vulnerability exists in the Word document parser of the the Atlantis Word Processor. A specially crafted document can cause an array fetch to return an uninitialized pointer and then performs some arithmetic before writing a value to the result. Usage of this uninitialized pointer can allow an attacker to corrupt heap memory resulting in code execution under the context of the application. An attacker must convince a victim to open a document in order to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3984.json b/2018/3xxx/CVE-2018-3984.json index 8ca2a26dccc..e8da37673b0 100644 --- a/2018/3xxx/CVE-2018-3984.json +++ b/2018/3xxx/CVE-2018-3984.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0652" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3985.json b/2018/3xxx/CVE-2018-3985.json index 63cfdab36a8..53fdd9f885e 100644 --- a/2018/3xxx/CVE-2018-3985.json +++ b/2018/3xxx/CVE-2018-3985.json @@ -58,5 +58,13 @@ "value": "An exploitable double free vulnerability exists in the mdnscap binary of the CUJO Smart Firewall. When parsing mDNS packets, a memory space is freed twice if an invalid query name is encountered, leading to arbitrary code execution in the context of the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.3, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3986.json b/2018/3xxx/CVE-2018-3986.json index 1383d8b1579..874c564f1e4 100644 --- a/2018/3xxx/CVE-2018-3986.json +++ b/2018/3xxx/CVE-2018-3986.json @@ -63,5 +63,13 @@ "url": "http://www.securityfocus.com/bid/106295" } ] + }, + "impact": { + "cvss": { + "baseScore": 4.2, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3987.json b/2018/3xxx/CVE-2018-3987.json index 799d9afa214..c495d5e43b7 100644 --- a/2018/3xxx/CVE-2018-3987.json +++ b/2018/3xxx/CVE-2018-3987.json @@ -58,5 +58,13 @@ "value": "An exploitable information disclosure vulnerability exists in the 'Secret Chats' functionality of Rakuten Viber on Android 9.3.0.6. The 'Secret Chats' functionality allows a user to delete all traces of a chat either by using a time trigger or by direct request. There is a bug in this functionality which leaves behind photos taken and shared on the secret chats, even after the chats are deleted. These photos will be stored in the device and accessible to all applications installed on the Android device." } ] + }, + "impact": { + "cvss": { + "baseScore": 4.2, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3988.json b/2018/3xxx/CVE-2018-3988.json index 3a88f441196..4d066858a11 100644 --- a/2018/3xxx/CVE-2018-3988.json +++ b/2018/3xxx/CVE-2018-3988.json @@ -63,5 +63,13 @@ "url": "http://www.securityfocus.com/bid/106207" } ] + }, + "impact": { + "cvss": { + "baseScore": 3.3, + "baseSeverity": "Low", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3989.json b/2018/3xxx/CVE-2018-3989.json index 5b195e69772..c50489c6a9b 100644 --- a/2018/3xxx/CVE-2018-3989.json +++ b/2018/3xxx/CVE-2018-3989.json @@ -78,5 +78,13 @@ "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-902727.pdf" } ] + }, + "impact": { + "cvss": { + "baseScore": 4.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3990.json b/2018/3xxx/CVE-2018-3990.json index e3fe1c8fa86..d3bde358f74 100644 --- a/2018/3xxx/CVE-2018-3990.json +++ b/2018/3xxx/CVE-2018-3990.json @@ -78,5 +78,13 @@ "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-902727.pdf" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.3, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3991.json b/2018/3xxx/CVE-2018-3991.json index ec0c3e5c425..9428968ead8 100644 --- a/2018/3xxx/CVE-2018-3991.json +++ b/2018/3xxx/CVE-2018-3991.json @@ -78,5 +78,13 @@ "url": "https://cert-portal.siemens.com/productcert/pdf/ssa-902727.pdf" } ] + }, + "impact": { + "cvss": { + "baseScore": 10.0, + "baseSeverity": null, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3992.json b/2018/3xxx/CVE-2018-3992.json index 03589eaacf0..00f92043195 100644 --- a/2018/3xxx/CVE-2018-3992.json +++ b/2018/3xxx/CVE-2018-3992.json @@ -64,5 +64,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0660" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3993.json b/2018/3xxx/CVE-2018-3993.json index 7c50d6a4ddc..6f19ba0a7eb 100644 --- a/2018/3xxx/CVE-2018-3993.json +++ b/2018/3xxx/CVE-2018-3993.json @@ -64,5 +64,13 @@ "url": "http://www.securitytracker.com/id/1041769" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3994.json b/2018/3xxx/CVE-2018-3994.json index 1a520024801..7d8d0146b5b 100644 --- a/2018/3xxx/CVE-2018-3994.json +++ b/2018/3xxx/CVE-2018-3994.json @@ -64,5 +64,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0662" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3995.json b/2018/3xxx/CVE-2018-3995.json index 081b7a0982f..b4d113f4c34 100644 --- a/2018/3xxx/CVE-2018-3995.json +++ b/2018/3xxx/CVE-2018-3995.json @@ -64,5 +64,13 @@ "url": "http://www.securitytracker.com/id/1041769" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3996.json b/2018/3xxx/CVE-2018-3996.json index b0d1f0eeb5f..d84efd056a3 100644 --- a/2018/3xxx/CVE-2018-3996.json +++ b/2018/3xxx/CVE-2018-3996.json @@ -64,5 +64,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0664" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3997.json b/2018/3xxx/CVE-2018-3997.json index 5b9df0d6ccc..0cda374c4df 100644 --- a/2018/3xxx/CVE-2018-3997.json +++ b/2018/3xxx/CVE-2018-3997.json @@ -64,5 +64,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0665" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3998.json b/2018/3xxx/CVE-2018-3998.json index c0431b054e8..a8b91b1a293 100644 --- a/2018/3xxx/CVE-2018-3998.json +++ b/2018/3xxx/CVE-2018-3998.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0666" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/3xxx/CVE-2018-3999.json b/2018/3xxx/CVE-2018-3999.json index b8402e51b3f..cd9cddffe4f 100644 --- a/2018/3xxx/CVE-2018-3999.json +++ b/2018/3xxx/CVE-2018-3999.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0667" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4000.json b/2018/4xxx/CVE-2018-4000.json index 7e638b75bb6..ae2e8f224eb 100644 --- a/2018/4xxx/CVE-2018-4000.json +++ b/2018/4xxx/CVE-2018-4000.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0668" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4001.json b/2018/4xxx/CVE-2018-4001.json index da109608b5b..e72e86beb35 100644 --- a/2018/4xxx/CVE-2018-4001.json +++ b/2018/4xxx/CVE-2018-4001.json @@ -58,5 +58,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0669" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4002.json b/2018/4xxx/CVE-2018-4002.json index 6023783ad9a..925cdb47609 100644 --- a/2018/4xxx/CVE-2018-4002.json +++ b/2018/4xxx/CVE-2018-4002.json @@ -58,5 +58,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the mdnscap binary of the CUJO Smart Firewall running firmware 7003. When parsing labels in mDNS packets, the firewall unsafely handles label compression pointers, leading to an uncontrolled recursion that eventually exhausts the stack, crashing the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 5.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4003.json b/2018/4xxx/CVE-2018-4003.json index a8738a1f602..eb250d66926 100644 --- a/2018/4xxx/CVE-2018-4003.json +++ b/2018/4xxx/CVE-2018-4003.json @@ -58,5 +58,13 @@ "value": "An exploitable heap overflow vulnerability exists in the mdnscap binary of the CUJO Smart Firewall running firmware 7003. The string lengths are handled incorrectly when parsing character strings in mDNS resource records, leading to arbitrary code execution in the context of the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.3, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4004.json b/2018/4xxx/CVE-2018-4004.json index 53838783cf1..41e25179e6e 100644 --- a/2018/4xxx/CVE-2018-4004.json +++ b/2018/4xxx/CVE-2018-4004.json @@ -58,5 +58,13 @@ "value": "An exploitable privilege escalation vulnerability exists in the Shimo VPN 4.1.5.1 helper service in the disconnectService functionality. A non-root user is able to kill any privileged process on the system. An attacker would need local access to the machine for a successful exploit." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4005.json b/2018/4xxx/CVE-2018-4005.json index 97282a19ba6..12bd5b4bba8 100644 --- a/2018/4xxx/CVE-2018-4005.json +++ b/2018/4xxx/CVE-2018-4005.json @@ -58,5 +58,13 @@ "value": "An exploitable privilege escalation vulnerability exists in the Shimo VPN 4.1.5.1 helper service in the configureRoutingWithCommand function. A user with local access can use this vulnerability to raise their privileges to root. An attacker would need local access to the machine for a successful exploit." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.3, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4006.json b/2018/4xxx/CVE-2018-4006.json index 1932237d8e3..d7c24e7d1a8 100644 --- a/2018/4xxx/CVE-2018-4006.json +++ b/2018/4xxx/CVE-2018-4006.json @@ -58,5 +58,13 @@ "value": "An exploitable privilege escalation vulnerability exists in the Shimo VPN 4.1.5.1 helper service in the writeConfig functionality. A non-root user is able to write a file anywhere on the system. A user with local access can use this vulnerability to raise their privileges to root. An attacker would need local access to the machine to exploit it successfully." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.3, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4007.json b/2018/4xxx/CVE-2018-4007.json index 5d8a979c94b..880ca293760 100644 --- a/2018/4xxx/CVE-2018-4007.json +++ b/2018/4xxx/CVE-2018-4007.json @@ -58,5 +58,13 @@ "value": "An exploitable privilege escalation vulnerability exists in the Shimo VPN 4.1.5.1 helper service in the deleteConfig functionality. The program is able to delete any protected file on the system. An attacker would need local access to the machine to successfully exploit the bug." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.0, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4008.json b/2018/4xxx/CVE-2018-4008.json index 8796a6c066c..4caf59e9529 100644 --- a/2018/4xxx/CVE-2018-4008.json +++ b/2018/4xxx/CVE-2018-4008.json @@ -58,5 +58,13 @@ "value": "An exploitable privilege escalation vulnerability exists in the Shimo VPN 4.1.5.1 helper service in the RunVpncScript command. The command takes a user-supplied script argument and executes it under root context. A user with local access can use this vulnerability to raise their privileges to root. An attacker would need local access to the machine to successfully exploit this bug." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.3, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4009.json b/2018/4xxx/CVE-2018-4009.json index 04f325c4cff..633bc1ebf03 100644 --- a/2018/4xxx/CVE-2018-4009.json +++ b/2018/4xxx/CVE-2018-4009.json @@ -58,5 +58,13 @@ "value": "An exploitable privilege escalation vulnerability exists in the Shimo VPN helper service due to improper validation of code signing. A user with local access can use this vulnerability to raise their privileges to root. An attacker would need local access to the machine to successfully exploit this bug." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4010.json b/2018/4xxx/CVE-2018-4010.json index 5ea1413e65b..cf8b34841a5 100644 --- a/2018/4xxx/CVE-2018-4010.json +++ b/2018/4xxx/CVE-2018-4010.json @@ -64,5 +64,13 @@ "url": "http://www.securityfocus.com/bid/105319" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4011.json b/2018/4xxx/CVE-2018-4011.json index e4825300772..d5861c2e00e 100644 --- a/2018/4xxx/CVE-2018-4011.json +++ b/2018/4xxx/CVE-2018-4011.json @@ -58,5 +58,13 @@ "value": "An exploitable integer underflow vulnerability exists in the mdnscap binary of the CUJO Smart Firewall, version 7003. When parsing SRV records in an mDNS packet, the \"RDLENGTH\" value is handled incorrectly, leading to an out-of-bounds access that crashes the mdnscap process. An unauthenticated attacker can send an mDNS message to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 6.5, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4012.json b/2018/4xxx/CVE-2018-4012.json index 80b926f99a0..c87844edcf4 100644 --- a/2018/4xxx/CVE-2018-4012.json +++ b/2018/4xxx/CVE-2018-4012.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0683" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.0, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4013.json b/2018/4xxx/CVE-2018-4013.json index 2094fda366d..351089bd562 100644 --- a/2018/4xxx/CVE-2018-4013.json +++ b/2018/4xxx/CVE-2018-4013.json @@ -79,5 +79,13 @@ "url": "https://security.gentoo.org/glsa/202005-06" } ] + }, + "impact": { + "cvss": { + "baseScore": 10.0, + "baseSeverity": null, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4014.json b/2018/4xxx/CVE-2018-4014.json index 8b1651891db..f41c2f487b0 100644 --- a/2018/4xxx/CVE-2018-4014.json +++ b/2018/4xxx/CVE-2018-4014.json @@ -58,5 +58,13 @@ "value": "An exploitable code execution vulnerability exists in Wi-Fi Command 9999 of the Roav A1 Dashcam running version RoavA1SWV1.9. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4015.json b/2018/4xxx/CVE-2018-4015.json index 17e2a84bce6..9e27b02a989 100644 --- a/2018/4xxx/CVE-2018-4015.json +++ b/2018/4xxx/CVE-2018-4015.json @@ -58,5 +58,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0686" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4016.json b/2018/4xxx/CVE-2018-4016.json index cefe60fc816..93be7bc0403 100644 --- a/2018/4xxx/CVE-2018-4016.json +++ b/2018/4xxx/CVE-2018-4016.json @@ -58,5 +58,13 @@ "value": "An exploitable code execution vulnerability exists in the URL-parsing functionality of the Roav A1 Dashcam running version RoavA1SWV1.9. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution. An attacker can send a packet to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 8.0, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4017.json b/2018/4xxx/CVE-2018-4017.json index c587d68cde3..34bd5448a5a 100644 --- a/2018/4xxx/CVE-2018-4017.json +++ b/2018/4xxx/CVE-2018-4017.json @@ -58,5 +58,13 @@ "value": "An exploitable vulnerability exists in the Wi-Fi Access Point feature of the Roav A1 Dashcam running version RoavA1SWV1.9. A set of default credentials can potentially be used to connect to the device. An attacker can connect to the AP to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4018.json b/2018/4xxx/CVE-2018-4018.json index b2a92d8b126..26a3b19b95d 100644 --- a/2018/4xxx/CVE-2018-4018.json +++ b/2018/4xxx/CVE-2018-4018.json @@ -58,5 +58,13 @@ "value": "An exploitable firmware update vulnerability exists in the NT9665X Chipset firmware, running on Anker Roav A1 Dashcam version RoavA1SWV1.9. The HTTP server allows for arbitrary firmware binaries to be uploaded which will be flashed upon next reboot. An attacker can send an HTTP PUT request or upgrade firmware request to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 10.0, + "baseSeverity": null, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4019.json b/2018/4xxx/CVE-2018-4019.json index 438f1404177..de9b2daf648 100644 --- a/2018/4xxx/CVE-2018-4019.json +++ b/2018/4xxx/CVE-2018-4019.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4020.json b/2018/4xxx/CVE-2018-4020.json index 980cbb28aff..5737436e931 100644 --- a/2018/4xxx/CVE-2018-4020.json +++ b/2018/4xxx/CVE-2018-4020.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4021.json b/2018/4xxx/CVE-2018-4021.json index 3235ae2b317..14992150c04 100644 --- a/2018/4xxx/CVE-2018-4021.json +++ b/2018/4xxx/CVE-2018-4021.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0690" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.2, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4022.json b/2018/4xxx/CVE-2018-4022.json index 54c8ccd4fb0..a0528e89405 100644 --- a/2018/4xxx/CVE-2018-4022.json +++ b/2018/4xxx/CVE-2018-4022.json @@ -58,5 +58,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0694" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.3, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4023.json b/2018/4xxx/CVE-2018-4023.json index 56899768ea1..5a044b8ed07 100644 --- a/2018/4xxx/CVE-2018-4023.json +++ b/2018/4xxx/CVE-2018-4023.json @@ -58,5 +58,13 @@ "value": "An exploitable code execution vulnerability exists in the XML_UploadFile Wi-Fi command of the NT9665X Chipset firmware, running on the Anker Roav A1 Dashcam, version RoavA1SWV1.9. A specially crafted packet can cause a stack-based buffer overflow, resulting in code execution." } ] + }, + "impact": { + "cvss": { + "baseScore": 10.0, + "baseSeverity": null, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4024.json b/2018/4xxx/CVE-2018-4024.json index 40d8b28b186..341a4b9d5b4 100644 --- a/2018/4xxx/CVE-2018-4024.json +++ b/2018/4xxx/CVE-2018-4024.json @@ -58,5 +58,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the thumbnail display functionality of the NT9665X Chipset firmware, running on the Anker Roav A1 Dashcam, version RoavA1SWV1.9. A specially crafted packet can cause a null pointer dereference, resulting in a device reboot." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4025.json b/2018/4xxx/CVE-2018-4025.json index 3718e4f0ef4..77f3d138110 100644 --- a/2018/4xxx/CVE-2018-4025.json +++ b/2018/4xxx/CVE-2018-4025.json @@ -58,5 +58,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the XML_GetRawEncJpg Wi-Fi command of the NT9665X Chipset firmware, running on the Anker Roav A1 Dashcam, version RoavA1SWV1.9. A specially crafted packet can cause an invalid memory dereference, resulting in a device reboot." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4026.json b/2018/4xxx/CVE-2018-4026.json index 5da007c5056..6d4683da97f 100644 --- a/2018/4xxx/CVE-2018-4026.json +++ b/2018/4xxx/CVE-2018-4026.json @@ -58,5 +58,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the XML_GetScreen Wi-Fi command of the NT9665X Chipset firmware, running on the Anker Roav A1 Dashcam, version RoavA1SWV1.9. A specially crafted set of packets can cause an invalid memory dereference, resulting in a device reboot." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.5, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4027.json b/2018/4xxx/CVE-2018-4027.json index 931d819474d..dbe42514cd4 100644 --- a/2018/4xxx/CVE-2018-4027.json +++ b/2018/4xxx/CVE-2018-4027.json @@ -58,5 +58,13 @@ "value": "An exploitable denial-of-service vulnerability exists in the XML_UploadFile Wi-Fi command of the NT9665X Chipset firmware, running on the Anker Roav A1 Dashcam, version RoavA1SWV1.9. A specially crafted packet can cause a semaphore deadlock, which prevents the device from receiving any physical or network inputs. An attacker can send a specially crafted packet to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 5.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4028.json b/2018/4xxx/CVE-2018-4028.json index 37ae2df5b51..3940f8b3945 100644 --- a/2018/4xxx/CVE-2018-4028.json +++ b/2018/4xxx/CVE-2018-4028.json @@ -58,5 +58,13 @@ "value": "An exploitable firmware update vulnerability exists in the NT9665X Chipset firmware running on the Anker Roav A1 Dashcam, version RoavA1SWV1.9. The HTTP server could allow an attacker to overwrite the root directory of the server, resulting in a denial of service. An attacker can send an HTTP POST request to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 5.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4029.json b/2018/4xxx/CVE-2018-4029.json index fa9732ed4aa..4154f55e583 100644 --- a/2018/4xxx/CVE-2018-4029.json +++ b/2018/4xxx/CVE-2018-4029.json @@ -58,5 +58,13 @@ "value": "An exploitable code execution vulnerability exists in the HTTP request-parsing function of the NT9665X Chipset firmware running on the Anker Roav A1 Dashcam, version RoavA1SWV1.9. A specially crafted packet can cause an unlimited and arbitrary write to memory, resulting in code execution." } ] + }, + "impact": { + "cvss": { + "baseScore": 10.0, + "baseSeverity": null, + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4030.json b/2018/4xxx/CVE-2018-4030.json index e5150bf3431..4a364d74e7d 100644 --- a/2018/4xxx/CVE-2018-4030.json +++ b/2018/4xxx/CVE-2018-4030.json @@ -58,5 +58,13 @@ "value": "An exploitable vulnerability exists the safe browsing function of the CUJO Smart Firewall, version 7003. The bug lies in the way the safe browsing function parses HTTP requests. The \"Host\" header is incorrectly extracted from captured HTTP requests, which would allow an attacker to visit any malicious websites and bypass the firewall. An attacker could send an HTTP request to exploit this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 5.3, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4031.json b/2018/4xxx/CVE-2018-4031.json index ca935837171..df936d8e89e 100644 --- a/2018/4xxx/CVE-2018-4031.json +++ b/2018/4xxx/CVE-2018-4031.json @@ -58,5 +58,13 @@ "value": "An exploitable vulnerability exists in the safe browsing function of the CUJO Smart Firewall, version 7003. The flaw lies in the way the safe browsing function parses HTTP requests. The server hostname is extracted from captured HTTP/HTTPS requests and inserted as part of a Lua statement without prior sanitization, which results in arbitrary Lua script execution in the kernel. An attacker could send an HTTP request to exploit this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.0, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4032.json b/2018/4xxx/CVE-2018-4032.json index 297a0ed12d0..f092762ff59 100644 --- a/2018/4xxx/CVE-2018-4032.json +++ b/2018/4xxx/CVE-2018-4032.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0705" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4033.json b/2018/4xxx/CVE-2018-4033.json index 0281e8a2f71..c11e46ddb75 100644 --- a/2018/4xxx/CVE-2018-4033.json +++ b/2018/4xxx/CVE-2018-4033.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0706" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4034.json b/2018/4xxx/CVE-2018-4034.json index 6b02ad7585e..a8ed8ef4ca6 100644 --- a/2018/4xxx/CVE-2018-4034.json +++ b/2018/4xxx/CVE-2018-4034.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0707" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4035.json b/2018/4xxx/CVE-2018-4035.json index 9b5dffbd8d2..ed7e6be946a 100644 --- a/2018/4xxx/CVE-2018-4035.json +++ b/2018/4xxx/CVE-2018-4035.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0708" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4036.json b/2018/4xxx/CVE-2018-4036.json index e1835536ac3..ed6800e8e6d 100644 --- a/2018/4xxx/CVE-2018-4036.json +++ b/2018/4xxx/CVE-2018-4036.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0709" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4037.json b/2018/4xxx/CVE-2018-4037.json index b013cd5c798..1ce5c4461bd 100644 --- a/2018/4xxx/CVE-2018-4037.json +++ b/2018/4xxx/CVE-2018-4037.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0710" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4038.json b/2018/4xxx/CVE-2018-4038.json index 2194037134d..deb50aa3c1d 100644 --- a/2018/4xxx/CVE-2018-4038.json +++ b/2018/4xxx/CVE-2018-4038.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0711" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4039.json b/2018/4xxx/CVE-2018-4039.json index 71fe62ebb86..ede060d93d7 100644 --- a/2018/4xxx/CVE-2018-4039.json +++ b/2018/4xxx/CVE-2018-4039.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0712" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4040.json b/2018/4xxx/CVE-2018-4040.json index f51c31a6d75..19386f39b8f 100644 --- a/2018/4xxx/CVE-2018-4040.json +++ b/2018/4xxx/CVE-2018-4040.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0713" } ] + }, + "impact": { + "cvss": { + "baseScore": 8.8, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4041.json b/2018/4xxx/CVE-2018-4041.json index 9b8bcd11cce..60edc85f83d 100644 --- a/2018/4xxx/CVE-2018-4041.json +++ b/2018/4xxx/CVE-2018-4041.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0715" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4042.json b/2018/4xxx/CVE-2018-4042.json index 86d8e3c208b..21e17df15ba 100644 --- a/2018/4xxx/CVE-2018-4042.json +++ b/2018/4xxx/CVE-2018-4042.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0716" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4043.json b/2018/4xxx/CVE-2018-4043.json index e3a1e5ca0f6..c0d0d4e75c5 100644 --- a/2018/4xxx/CVE-2018-4043.json +++ b/2018/4xxx/CVE-2018-4043.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0717" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4044.json b/2018/4xxx/CVE-2018-4044.json index d2fdad15aed..892c07edc8d 100644 --- a/2018/4xxx/CVE-2018-4044.json +++ b/2018/4xxx/CVE-2018-4044.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0718" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4045.json b/2018/4xxx/CVE-2018-4045.json index 3c9474cf6ca..7e67c4a7519 100644 --- a/2018/4xxx/CVE-2018-4045.json +++ b/2018/4xxx/CVE-2018-4045.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0719" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4046.json b/2018/4xxx/CVE-2018-4046.json index 3ab21a71f99..5aeafb303d1 100644 --- a/2018/4xxx/CVE-2018-4046.json +++ b/2018/4xxx/CVE-2018-4046.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0720" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4047.json b/2018/4xxx/CVE-2018-4047.json index fb43be3acfa..5dd3fca09e4 100644 --- a/2018/4xxx/CVE-2018-4047.json +++ b/2018/4xxx/CVE-2018-4047.json @@ -58,5 +58,13 @@ "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0721" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4048.json b/2018/4xxx/CVE-2018-4048.json index fd2d326ea6a..00016b47077 100644 --- a/2018/4xxx/CVE-2018-4048.json +++ b/2018/4xxx/CVE-2018-4048.json @@ -58,5 +58,13 @@ "value": "An exploitable local privilege elevation vulnerability exists in the file system permissions of the `Temp` directory in GOG Galaxy 1.2.48.36 (Windows 64-bit Installer). An attacker can overwrite executables of the Desktop Galaxy Updater to exploit this vulnerability and execute arbitrary code with SYSTEM privileges." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.3, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4049.json b/2018/4xxx/CVE-2018-4049.json index 259c1a07ee8..5723db51f76 100644 --- a/2018/4xxx/CVE-2018-4049.json +++ b/2018/4xxx/CVE-2018-4049.json @@ -58,5 +58,13 @@ "value": "An exploitable local privilege elevation vulnerability exists in the file system permissions of GOG Galaxy's \u201cGames\u201d directory, version 1.2.48.36 (Windows 64-bit Installer). An attacker can overwrite executables of installed games to exploit this vulnerability and execute arbitrary code with elevated privileges." } ] + }, + "impact": { + "cvss": { + "baseScore": 9.3, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4050.json b/2018/4xxx/CVE-2018-4050.json index 5337410cff0..67a907307f0 100644 --- a/2018/4xxx/CVE-2018-4050.json +++ b/2018/4xxx/CVE-2018-4050.json @@ -58,5 +58,13 @@ "value": "An exploitable local privilege escalation vulnerability exists in the privileged helper tool of GOG Galaxy's Games, version 1.2.47 for macOS. An attacker can globally adjust folder permissions leading to execution of arbitrary code with elevated privileges." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4051.json b/2018/4xxx/CVE-2018-4051.json index 39415ad0853..5634df305f1 100644 --- a/2018/4xxx/CVE-2018-4051.json +++ b/2018/4xxx/CVE-2018-4051.json @@ -58,5 +58,13 @@ "value": "An exploitable local privilege escalation vulnerability exists in the privileged helper tool of GOG Galaxy's Games, version 1.2.47 for macOS. An attacker can globally create directories and subdirectories on the root file system, as well as change the permissions of existing directories." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4052.json b/2018/4xxx/CVE-2018-4052.json index e02a3ceb65e..3e2da407507 100644 --- a/2018/4xxx/CVE-2018-4052.json +++ b/2018/4xxx/CVE-2018-4052.json @@ -58,5 +58,13 @@ "value": "An exploitable local information leak vulnerability exists in the privileged helper tool of GOG Galaxy's Games, version 1.2.47 for macOS. An attacker can pass a PID and receive information running on it that would usually only be accessible to the root user." } ] + }, + "impact": { + "cvss": { + "baseScore": 6.2, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4053.json b/2018/4xxx/CVE-2018-4053.json index 0d6a78d72a4..35c9adbc615 100644 --- a/2018/4xxx/CVE-2018-4053.json +++ b/2018/4xxx/CVE-2018-4053.json @@ -58,5 +58,13 @@ "value": "An exploitable local denial-of-service vulnerability exists in the privileged helper tool of GOG Galaxy's Games, version 1.2.47 for macOS. An attacker can send malicious data to the root-listening service, causing the application to terminate and become unavailable." } ] + }, + "impact": { + "cvss": { + "baseScore": 6.2, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4054.json b/2018/4xxx/CVE-2018-4054.json index a3c21318bb5..22eaa3fdb86 100644 --- a/2018/4xxx/CVE-2018-4054.json +++ b/2018/4xxx/CVE-2018-4054.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0728" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.0, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4055.json b/2018/4xxx/CVE-2018-4055.json index 28a51477110..91fa5730717 100644 --- a/2018/4xxx/CVE-2018-4055.json +++ b/2018/4xxx/CVE-2018-4055.json @@ -59,5 +59,13 @@ "url": "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0729" } ] + }, + "impact": { + "cvss": { + "baseScore": 7.1, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4056.json b/2018/4xxx/CVE-2018-4056.json index 193bdb886bd..1c00058c48e 100644 --- a/2018/4xxx/CVE-2018-4056.json +++ b/2018/4xxx/CVE-2018-4056.json @@ -69,5 +69,13 @@ "url": "https://www.debian.org/security/2019/dsa-4373" } ] + }, + "impact": { + "cvss": { + "baseScore": 9.1, + "baseSeverity": "Critical", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4058.json b/2018/4xxx/CVE-2018-4058.json index 812eb9bf1d0..7883a23d6fa 100644 --- a/2018/4xxx/CVE-2018-4058.json +++ b/2018/4xxx/CVE-2018-4058.json @@ -58,5 +58,13 @@ "value": "An exploitable unsafe default configuration vulnerability exists in the TURN server functionality of coTURN prior to 4.5.0.9. By default, the TURN server allows relaying external traffic to the loopback interface of its own host. This can provide access to other private services running on that host, which can lead to further attacks. An attacker can set up a relay with a loopback address as the peer on an affected TURN server to trigger this vulnerability." } ] + }, + "impact": { + "cvss": { + "baseScore": 7.7, + "baseSeverity": "High", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N", + "version": "3.0" + } } } \ No newline at end of file diff --git a/2018/4xxx/CVE-2018-4059.json b/2018/4xxx/CVE-2018-4059.json index 1bfda60b5b5..3a93d9a53c8 100644 --- a/2018/4xxx/CVE-2018-4059.json +++ b/2018/4xxx/CVE-2018-4059.json @@ -58,5 +58,13 @@ "value": "An exploitable unsafe default configuration vulnerability exists in the TURN server function of coTURN prior to version 4.5.0.9. By default, the TURN server runs an unauthenticated telnet admin portal on the loopback interface. This can provide administrator access to the TURN server configuration, which can lead to additional attacks. An attacker who can get access to the telnet port can gain administrator access to the TURN server." } ] + }, + "impact": { + "cvss": { + "baseScore": 6.5, + "baseSeverity": "Medium", + "vectorString": "CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H", + "version": "3.0" + } } } \ No newline at end of file