diff --git a/2018/20xxx/CVE-2018-20115.json b/2018/20xxx/CVE-2018-20115.json new file mode 100644 index 00000000000..59f124c2020 --- /dev/null +++ b/2018/20xxx/CVE-2018-20115.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20115", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20116.json b/2018/20xxx/CVE-2018-20116.json new file mode 100644 index 00000000000..76a79943c5b --- /dev/null +++ b/2018/20xxx/CVE-2018-20116.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20116", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20117.json b/2018/20xxx/CVE-2018-20117.json new file mode 100644 index 00000000000..1b78dd59c91 --- /dev/null +++ b/2018/20xxx/CVE-2018-20117.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20117", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20118.json b/2018/20xxx/CVE-2018-20118.json new file mode 100644 index 00000000000..bf0e1856d8b --- /dev/null +++ b/2018/20xxx/CVE-2018-20118.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20118", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20119.json b/2018/20xxx/CVE-2018-20119.json new file mode 100644 index 00000000000..8be34b2a8f2 --- /dev/null +++ b/2018/20xxx/CVE-2018-20119.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20119", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20120.json b/2018/20xxx/CVE-2018-20120.json new file mode 100644 index 00000000000..50a676d93d8 --- /dev/null +++ b/2018/20xxx/CVE-2018-20120.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20120", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20121.json b/2018/20xxx/CVE-2018-20121.json new file mode 100644 index 00000000000..28cbaf7d530 --- /dev/null +++ b/2018/20xxx/CVE-2018-20121.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20121", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/6xxx/CVE-2018-6706.json b/2018/6xxx/CVE-2018-6706.json index 232ae75d8a5..202cacb9c81 100644 --- a/2018/6xxx/CVE-2018-6706.json +++ b/2018/6xxx/CVE-2018-6706.json @@ -1,116 +1,116 @@ { - "CVE_data_meta": { - "ASSIGNER": "psirt@mcafee.com", - "ID": "CVE-2018-6706", - "STATE": "PUBLIC", - "TITLE": "McAfee Agent (MA) non-Windows versions incorrect use of temporary file vulnerability " + "CVE_data_meta" : { + "ASSIGNER" : "psirt@mcafee.com", + "ID" : "CVE-2018-6706", + "STATE" : "PUBLIC", + "TITLE" : "McAfee Agent (MA) non-Windows versions incorrect use of temporary file vulnerability " }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "McAfee Agent (MA) for Linux", - "version": { - "version_data": [ + "product_name" : "McAfee Agent (MA) for Linux", + "version" : { + "version_data" : [ { - "affected": ">=", - "platform": "x86", - "version_name": "5.0.0", - "version_value": "5.0.0" + "affected" : ">=", + "platform" : "x86", + "version_name" : "5.0.0", + "version_value" : "5.0.0" }, { - "affected": "<=", - "platform": "x86", - "version_name": "5.0.6", - "version_value": "5.0.6" + "affected" : "<=", + "platform" : "x86", + "version_name" : "5.0.6", + "version_value" : "5.0.6" }, { - "affected": "=", - "platform": "x86", - "version_name": "5.5.0", - "version_value": "5.5.0" + "affected" : "=", + "platform" : "x86", + "version_name" : "5.5.0", + "version_value" : "5.5.0" }, { - "affected": "=", - "platform": "x86", - "version_name": "5.5.1", - "version_value": "5.5.1" + "affected" : "=", + "platform" : "x86", + "version_name" : "5.5.1", + "version_value" : "5.5.1" } ] } } ] }, - "vendor_name": "McAfee" + "vendor_name" : "McAfee" } ] } }, - "credit": [ + "credit" : [ { - "lang": "eng", - "value": "McAfee credits Brandon Vincent for discovery of this vulnerability" + "lang" : "eng", + "value" : "McAfee credits Brandon Vincent for discovery of this vulnerability" } ], - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "Insecure handling of temporary files in non-Windows McAfee Agent 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows an Unprivileged User to introduce custom paths during agent installation in Linux via unspecified vectors." + "lang" : "eng", + "value" : "Insecure handling of temporary files in non-Windows McAfee Agent 5.0.0 through 5.0.6, 5.5.0, and 5.5.1 allows an Unprivileged User to introduce custom paths during agent installation in Linux via unspecified vectors." } ] }, - "impact": { - "cvss": { - "attackComplexity": "HIGH", - "attackVector": "LOCAL", - "availabilityImpact": "NONE", - "baseScore": 2.3, - "baseSeverity": "LOW", - "confidentialityImpact": "NONE", - "integrityImpact": "LOW", - "privilegesRequired": "HIGH", - "scope": "CHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:N", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "HIGH", + "attackVector" : "LOCAL", + "availabilityImpact" : "NONE", + "baseScore" : 2.3, + "baseSeverity" : "LOW", + "confidentialityImpact" : "NONE", + "integrityImpact" : "LOW", + "privilegesRequired" : "HIGH", + "scope" : "CHANGED", + "userInteraction" : "REQUIRED", + "vectorString" : "CVSS:3.0/AV:L/AC:H/PR:H/UI:R/S:C/C:N/I:L/A:N", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "Insecure Temporary File (CWE-377)" + "lang" : "eng", + "value" : "Insecure Temporary File (CWE-377)" } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10260", - "refsource": "CONFIRM", - "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10260" + "name" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10260", + "refsource" : "CONFIRM", + "url" : "https://kc.mcafee.com/corporate/index?page=content&id=SB10260" } ] }, - "solution": [ + "solution" : [ { - "lang": "eng", - "value": "McAfee highly recommends that all customers upgrade to McAfee Agent 5.6.0." + "lang" : "eng", + "value" : "McAfee highly recommends that all customers upgrade to McAfee Agent 5.6.0." } ], - "source": { - "advisory": "SB10260", - "discovery": "EXTERNAL" + "source" : { + "advisory" : "SB10260", + "discovery" : "EXTERNAL" } }