From 52296285a4b014ac6d11a03972b31b1fffd3c1e5 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 4 Dec 2018 04:09:19 -0500 Subject: [PATCH] - Synchronized data. --- 2018/19xxx/CVE-2018-19837.json | 53 +++++++++++++++++++++++++++-- 2018/19xxx/CVE-2018-19838.json | 48 ++++++++++++++++++++++++-- 2018/19xxx/CVE-2018-19839.json | 53 +++++++++++++++++++++++++++-- 2018/19xxx/CVE-2018-19840.json | 53 +++++++++++++++++++++++++++-- 2018/19xxx/CVE-2018-19841.json | 53 +++++++++++++++++++++++++++-- 2018/19xxx/CVE-2018-19842.json | 53 +++++++++++++++++++++++++++-- 2018/19xxx/CVE-2018-19843.json | 53 +++++++++++++++++++++++++++-- 2018/19xxx/CVE-2018-19849.json | 62 ++++++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19850.json | 18 ++++++++++ 2018/19xxx/CVE-2018-19851.json | 18 ++++++++++ 2018/19xxx/CVE-2018-19852.json | 18 ++++++++++ 2018/19xxx/CVE-2018-19853.json | 62 ++++++++++++++++++++++++++++++++++ 12 files changed, 530 insertions(+), 14 deletions(-) create mode 100644 2018/19xxx/CVE-2018-19849.json create mode 100644 2018/19xxx/CVE-2018-19850.json create mode 100644 2018/19xxx/CVE-2018-19851.json create mode 100644 2018/19xxx/CVE-2018-19852.json create mode 100644 2018/19xxx/CVE-2018-19853.json diff --git a/2018/19xxx/CVE-2018-19837.json b/2018/19xxx/CVE-2018-19837.json index b85ac1f899a..13568b90bea 100644 --- a/2018/19xxx/CVE-2018-19837.json +++ b/2018/19xxx/CVE-2018-19837.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-19837", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,33 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "In LibSass prior to 3.5.5, Sass::Eval::operator()(Sass::Binary_Expression*) inside eval.cpp allows attackers to cause a denial-of-service resulting from stack consumption via a crafted sass file, because of certain incorrect parsing of '%' as a modulo operator in parser.cpp." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/sass/libsass/commit/210fdff7a65370c2ae24e022a2b35da8c423cc5f", + "refsource" : "MISC", + "url" : "https://github.com/sass/libsass/commit/210fdff7a65370c2ae24e022a2b35da8c423cc5f" + }, + { + "name" : "https://github.com/sass/libsass/issues/2659", + "refsource" : "MISC", + "url" : "https://github.com/sass/libsass/issues/2659" } ] } diff --git a/2018/19xxx/CVE-2018-19838.json b/2018/19xxx/CVE-2018-19838.json index 9d0f04f0327..2ecd8cf593e 100644 --- a/2018/19xxx/CVE-2018-19838.json +++ b/2018/19xxx/CVE-2018-19838.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-19838", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "In LibSass prior to 3.5.5, functions inside ast.cpp for IMPLEMENT_AST_OPERATORS expansion allow attackers to cause a denial-of-service resulting from stack consumption via a crafted sass file, as demonstrated by recursive calls involving clone(), cloneChildren(), and copy()." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/sass/libsass/issues/2660", + "refsource" : "MISC", + "url" : "https://github.com/sass/libsass/issues/2660" } ] } diff --git a/2018/19xxx/CVE-2018-19839.json b/2018/19xxx/CVE-2018-19839.json index 5a101568ee7..7ed8583e98f 100644 --- a/2018/19xxx/CVE-2018-19839.json +++ b/2018/19xxx/CVE-2018-19839.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-19839", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,33 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "In LibSass prior to 3.5.5, the function handle_error in sass_context.cpp allows attackers to cause a denial-of-service resulting from a heap-based buffer over-read via a crafted sass file." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/sass/libsass/issues/2657", + "refsource" : "MISC", + "url" : "https://github.com/sass/libsass/issues/2657" + }, + { + "name" : "https://github.com/sass/libsass/pull/2767", + "refsource" : "MISC", + "url" : "https://github.com/sass/libsass/pull/2767" } ] } diff --git a/2018/19xxx/CVE-2018-19840.json b/2018/19xxx/CVE-2018-19840.json index 1181e3ec25d..4ed51b48952 100644 --- a/2018/19xxx/CVE-2018-19840.json +++ b/2018/19xxx/CVE-2018-19840.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-19840", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,33 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/dbry/WavPack/commit/070ef6f138956d9ea9612e69586152339dbefe51", + "refsource" : "MISC", + "url" : "https://github.com/dbry/WavPack/commit/070ef6f138956d9ea9612e69586152339dbefe51" + }, + { + "name" : "https://github.com/dbry/WavPack/issues/53", + "refsource" : "MISC", + "url" : "https://github.com/dbry/WavPack/issues/53" } ] } diff --git a/2018/19xxx/CVE-2018-19841.json b/2018/19xxx/CVE-2018-19841.json index 765a2da2850..ed34cbbefbd 100644 --- a/2018/19xxx/CVE-2018-19841.json +++ b/2018/19xxx/CVE-2018-19841.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-19841", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,33 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "The function WavpackVerifySingleBlock in open_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (out-of-bounds read and application crash) via a crafted WavPack Lossless Audio file, as demonstrated by wvunpack." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/dbry/WavPack/commit/bba5389dc598a92bdf2b297c3ea34620b6679b5b", + "refsource" : "MISC", + "url" : "https://github.com/dbry/WavPack/commit/bba5389dc598a92bdf2b297c3ea34620b6679b5b" + }, + { + "name" : "https://github.com/dbry/WavPack/issues/54", + "refsource" : "MISC", + "url" : "https://github.com/dbry/WavPack/issues/54" } ] } diff --git a/2018/19xxx/CVE-2018-19842.json b/2018/19xxx/CVE-2018-19842.json index 843be96c5bc..8de236d6368 100644 --- a/2018/19xxx/CVE-2018-19842.json +++ b/2018/19xxx/CVE-2018-19842.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-19842", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,33 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "getToken in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (stack-based buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/radare/radare2/commit/66191f780863ea8c66ace4040d0d04a8842e8432", + "refsource" : "MISC", + "url" : "https://github.com/radare/radare2/commit/66191f780863ea8c66ace4040d0d04a8842e8432" + }, + { + "name" : "https://github.com/radare/radare2/issues/12239", + "refsource" : "MISC", + "url" : "https://github.com/radare/radare2/issues/12239" } ] } diff --git a/2018/19xxx/CVE-2018-19843.json b/2018/19xxx/CVE-2018-19843.json index eedcb8569e5..d26675f42d5 100644 --- a/2018/19xxx/CVE-2018-19843.json +++ b/2018/19xxx/CVE-2018-19843.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-19843", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,33 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "opmov in libr/asm/p/asm_x86_nz.c in radare2 before 3.1.0 allows attackers to cause a denial of service (buffer over-read) via crafted x86 assembly data, as demonstrated by rasm2." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/radare/radare2/commit/f17bfd9f1da05f30f23a4dd05e9d2363e1406948", + "refsource" : "MISC", + "url" : "https://github.com/radare/radare2/commit/f17bfd9f1da05f30f23a4dd05e9d2363e1406948" + }, + { + "name" : "https://github.com/radare/radare2/issues/12242", + "refsource" : "MISC", + "url" : "https://github.com/radare/radare2/issues/12242" } ] } diff --git a/2018/19xxx/CVE-2018-19849.json b/2018/19xxx/CVE-2018-19849.json new file mode 100644 index 00000000000..8512be14a8f --- /dev/null +++ b/2018/19xxx/CVE-2018-19849.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19849", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in YzmCMS 5.2. XSS exists via the admin/content/search.html searinfo parameter." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/yzmcms/yzmcms/issues/8", + "refsource" : "MISC", + "url" : "https://github.com/yzmcms/yzmcms/issues/8" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19850.json b/2018/19xxx/CVE-2018-19850.json new file mode 100644 index 00000000000..2f4479a0d9b --- /dev/null +++ b/2018/19xxx/CVE-2018-19850.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19850", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19851.json b/2018/19xxx/CVE-2018-19851.json new file mode 100644 index 00000000000..ae5dd5089da --- /dev/null +++ b/2018/19xxx/CVE-2018-19851.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19851", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19852.json b/2018/19xxx/CVE-2018-19852.json new file mode 100644 index 00000000000..04059eba658 --- /dev/null +++ b/2018/19xxx/CVE-2018-19852.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19852", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19853.json b/2018/19xxx/CVE-2018-19853.json new file mode 100644 index 00000000000..0dbc5852ca0 --- /dev/null +++ b/2018/19xxx/CVE-2018-19853.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19853", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in hitshop through 2014-07-15. There is an elevation-of-privilege vulnerability (that allows control over the whole web site) via the admin.php/user/add URI because a storekeeper account (which is supposed to have only privileges for commodity management) can add an administrator account." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/liu946/hitshop/issues/1", + "refsource" : "MISC", + "url" : "https://github.com/liu946/hitshop/issues/1" + } + ] + } +}