mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-06-08 22:18:26 +00:00
- Synchronized data.
This commit is contained in:
parent
5bcc10c416
commit
5068a603ff
@ -35,7 +35,7 @@
|
|||||||
"description_data" : [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang" : "eng",
|
"lang" : "eng",
|
||||||
"value" : "Third party product Gigasoft, v5 and prior included in Communicator 3.15 and prior, A malicious HTML file that loads the ActiveX controls trigger the vulnerability via unchecked function calls."
|
"value" : "A heap-based buffer overflow exists in the third-party product Gigasoft, v5 and prior, included in GE Communicator 3.15 and prior. A malicious HTML file that loads the ActiveX controls can trigger the vulnerability via unchecked function calls."
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
},
|
},
|
||||||
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-02",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-02"
|
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-02"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-03",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-03"
|
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-03"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-03",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-03"
|
"url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-275-03"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -2,30 +2,7 @@
|
|||||||
"CVE_data_meta" : {
|
"CVE_data_meta" : {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
"ID" : "CVE-2018-17850",
|
"ID" : "CVE-2018-17850",
|
||||||
"STATE" : "PUBLIC"
|
"STATE" : "REJECT"
|
||||||
},
|
|
||||||
"affects" : {
|
|
||||||
"vendor" : {
|
|
||||||
"vendor_data" : [
|
|
||||||
{
|
|
||||||
"product" : {
|
|
||||||
"product_data" : [
|
|
||||||
{
|
|
||||||
"product_name" : "n/a",
|
|
||||||
"version" : {
|
|
||||||
"version_data" : [
|
|
||||||
{
|
|
||||||
"version_value" : "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name" : "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
"data_format" : "MITRE",
|
||||||
"data_type" : "CVE",
|
"data_type" : "CVE",
|
||||||
@ -34,28 +11,7 @@
|
|||||||
"description_data" : [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang" : "eng",
|
"lang" : "eng",
|
||||||
"value" : "An issue was discovered in JsonCpp 1.8.4. An unhandled exception vulnerability exists in Json::Value::clear() in json_value.cpp after throwing an instance of \"Json::LogicError what(): requires complex value.\" Specially crafted JSON requests can cause an unhandled exception resulting in denial of service. An attacker can send malicious JSON to trigger this vulnerability."
|
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"problemtype" : {
|
|
||||||
"problemtype_data" : [
|
|
||||||
{
|
|
||||||
"description" : [
|
|
||||||
{
|
|
||||||
"lang" : "eng",
|
|
||||||
"value" : "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"references" : {
|
|
||||||
"reference_data" : [
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/open-source-parsers/jsoncpp/issues/824",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/open-source-parsers/jsoncpp/issues/824"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -2,30 +2,7 @@
|
|||||||
"CVE_data_meta" : {
|
"CVE_data_meta" : {
|
||||||
"ASSIGNER" : "cve@mitre.org",
|
"ASSIGNER" : "cve@mitre.org",
|
||||||
"ID" : "CVE-2018-17851",
|
"ID" : "CVE-2018-17851",
|
||||||
"STATE" : "PUBLIC"
|
"STATE" : "REJECT"
|
||||||
},
|
|
||||||
"affects" : {
|
|
||||||
"vendor" : {
|
|
||||||
"vendor_data" : [
|
|
||||||
{
|
|
||||||
"product" : {
|
|
||||||
"product_data" : [
|
|
||||||
{
|
|
||||||
"product_name" : "n/a",
|
|
||||||
"version" : {
|
|
||||||
"version_data" : [
|
|
||||||
{
|
|
||||||
"version_value" : "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"vendor_name" : "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
},
|
},
|
||||||
"data_format" : "MITRE",
|
"data_format" : "MITRE",
|
||||||
"data_type" : "CVE",
|
"data_type" : "CVE",
|
||||||
@ -34,28 +11,7 @@
|
|||||||
"description_data" : [
|
"description_data" : [
|
||||||
{
|
{
|
||||||
"lang" : "eng",
|
"lang" : "eng",
|
||||||
"value" : "An issue was discovered in JsonCpp 1.8.4. An unhandled exception vulnerability exists in Json::OurReader::readValue() in json_reader.cpp after throwing an instance of \"Json::RuntimeError what(): Exceeded stackLimit.\" Specially crafted JSON requests can cause an unhandled exception resulting in denial of service. An attacker can send malicious JSON to trigger this vulnerability."
|
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none."
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"problemtype" : {
|
|
||||||
"problemtype_data" : [
|
|
||||||
{
|
|
||||||
"description" : [
|
|
||||||
{
|
|
||||||
"lang" : "eng",
|
|
||||||
"value" : "n/a"
|
|
||||||
}
|
|
||||||
]
|
|
||||||
}
|
|
||||||
]
|
|
||||||
},
|
|
||||||
"references" : {
|
|
||||||
"reference_data" : [
|
|
||||||
{
|
|
||||||
"name" : "https://github.com/open-source-parsers/jsoncpp/issues/823",
|
|
||||||
"refsource" : "MISC",
|
|
||||||
"url" : "https://github.com/open-source-parsers/jsoncpp/issues/823"
|
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
}
|
}
|
||||||
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0610",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0610"
|
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0610"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0611",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0611"
|
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0611"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
|
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
|
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
|
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
|
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
|
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
@ -54,6 +54,8 @@
|
|||||||
"references" : {
|
"references" : {
|
||||||
"reference_data" : [
|
"reference_data" : [
|
||||||
{
|
{
|
||||||
|
"name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628",
|
||||||
|
"refsource" : "MISC",
|
||||||
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
|
"url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2018-0628"
|
||||||
}
|
}
|
||||||
]
|
]
|
||||||
|
Loading…
x
Reference in New Issue
Block a user