- Synchronized data.

This commit is contained in:
CVE Team 2018-10-02 17:05:29 -04:00
parent 5bcc10c416
commit 5068a603ff
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
13 changed files with 27 additions and 93 deletions

View File

@ -35,7 +35,7 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "Third party product Gigasoft, v5 and prior included in Communicator 3.15 and prior, A malicious HTML file that loads the ActiveX controls trigger the vulnerability via unchecked function calls." "value" : "A heap-based buffer overflow exists in the third-party product Gigasoft, v5 and prior, included in GE Communicator 3.15 and prior. A malicious HTML file that loads the ActiveX controls can trigger the vulnerability via unchecked function calls."
} }
] ]
}, },
@ -54,6 +54,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-02",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-02" "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-02"
} }
] ]

View File

@ -54,6 +54,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-03",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-03" "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-03"
} }
] ]

View File

@ -54,6 +54,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-03",
"refsource" : "MISC",
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-03" "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-03"
} }
] ]

View File

@ -2,30 +2,7 @@
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-17850", "ID" : "CVE-2018-17850",
"STATE" : "PUBLIC" "STATE" : "REJECT"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
}, },
"data_format" : "MITRE", "data_format" : "MITRE",
"data_type" : "CVE", "data_type" : "CVE",
@ -34,28 +11,7 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "An issue was discovered in JsonCpp 1.8.4. An unhandled exception vulnerability exists in Json::Value::clear() in json_value.cpp after throwing an instance of \"Json::LogicError what(): requires complex value.\" Specially crafted JSON requests can cause an unhandled exception resulting in denial of service. An attacker can send malicious JSON to trigger this vulnerability." "value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://github.com/open-source-parsers/jsoncpp/issues/824",
"refsource" : "MISC",
"url" : "https://github.com/open-source-parsers/jsoncpp/issues/824"
} }
] ]
} }

View File

@ -2,30 +2,7 @@
"CVE_data_meta" : { "CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org", "ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2018-17851", "ID" : "CVE-2018-17851",
"STATE" : "PUBLIC" "STATE" : "REJECT"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
}, },
"data_format" : "MITRE", "data_format" : "MITRE",
"data_type" : "CVE", "data_type" : "CVE",
@ -34,28 +11,7 @@
"description_data" : [ "description_data" : [
{ {
"lang" : "eng", "lang" : "eng",
"value" : "An issue was discovered in JsonCpp 1.8.4. An unhandled exception vulnerability exists in Json::OurReader::readValue() in json_reader.cpp after throwing an instance of \"Json::RuntimeError what(): Exceeded stackLimit.\" Specially crafted JSON requests can cause an unhandled exception resulting in denial of service. An attacker can send malicious JSON to trigger this vulnerability." "value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "https://github.com/open-source-parsers/jsoncpp/issues/823",
"refsource" : "MISC",
"url" : "https://github.com/open-source-parsers/jsoncpp/issues/823"
} }
] ]
} }

View File

@ -54,6 +54,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0610",
"refsource" : "MISC",
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0610" "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0610"
} }
] ]

View File

@ -54,6 +54,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0611",
"refsource" : "MISC",
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0611" "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0611"
} }
] ]

View File

@ -54,6 +54,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628",
"refsource" : "MISC",
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628" "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
} }
] ]

View File

@ -54,6 +54,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628",
"refsource" : "MISC",
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628" "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
} }
] ]

View File

@ -54,6 +54,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628",
"refsource" : "MISC",
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628" "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
} }
] ]

View File

@ -54,6 +54,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628",
"refsource" : "MISC",
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628" "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
} }
] ]

View File

@ -54,6 +54,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628",
"refsource" : "MISC",
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628" "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
} }
] ]

View File

@ -54,6 +54,8 @@
"references" : { "references" : {
"reference_data" : [ "reference_data" : [
{ {
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628",
"refsource" : "MISC",
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628" "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
} }
] ]