Merge branch 'cna/jpcert20180406' of https://github.com/ktgm/cvelist

This commit is contained in:
CVE Team 2018-04-09 08:10:49 -04:00
commit 552e25ed87
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
5 changed files with 304 additions and 84 deletions

View File

@ -1,18 +1,62 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2018-0545", "data_version": "4.0",
"STATE" : "RESERVED" "CVE_data_meta": {
}, "ID": "CVE-2018-0545",
"data_format" : "MITRE", "ASSIGNER": "vultures@jpcert.or.jp"
"data_type" : "CVE", },
"data_version" : "4.0", "affects": {
"description" : { "vendor": {
"description_data" : [ "vendor_data": [
{ {
"lang" : "eng", "vendor_name": "LXR Project",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "product": {
} "product_data": [
] {
} "product_name": "LXR",
"version": {
"version_data": [
{
"version_value": "version 1.0.0 to 2.3.0"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang": "eng",
"value":"OS Command Injection"
}
]
}
]
},
"references":{
"reference_data":[
{
"url":"http://lxr.sourceforge.net/en/bugsandlimits.php"
},
{
"url":"http://jvn.jp/en/jp/JVN72589538/index.html"
}
]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"LXR version 1.0.0 to 2.3.0 allows remote attackers to execute arbitrary OS commands via unspecified vectors."
}
]
}
} }

View File

@ -1,18 +1,62 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2018-0553", "data_version": "4.0",
"STATE" : "RESERVED" "CVE_data_meta": {
}, "ID": "CVE-2018-0553",
"data_format" : "MITRE", "ASSIGNER": "vultures@jpcert.or.jp"
"data_type" : "CVE", },
"data_version" : "4.0", "affects": {
"description" : { "vendor": {
"description_data" : [ "vendor_data": [
{ {
"lang" : "eng", "vendor_name": "Glamo Inc.",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "product": {
} "product_data": [
] {
} "product_name": "iRemoconWiFi App for Android",
"version": {
"version_data": [
{
"version_value": "version 4.1.7 and earlier"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang": "eng",
"value":"Fails to verify SSL certificates"
}
]
}
]
},
"references":{
"reference_data":[
{
"url":"https://play.google.com/store/apps/details?id=jp.co.glamo.iremoconwifi"
},
{
"url":"http://jvn.jp/en/jp/JVN43382653/index.html"
}
]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"The iRemoconWiFi App for Android version 4.1.7 and earlier does not verify X.509 certificates from SSL servers, which allows man-in-the-middle attackers to spoof servers and obtain sensitive information via a crafted certificate."
}
]
}
} }

View File

@ -1,18 +1,62 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2018-0554", "data_version": "4.0",
"STATE" : "RESERVED" "CVE_data_meta": {
}, "ID": "CVE-2018-0554",
"data_format" : "MITRE", "ASSIGNER": "vultures@jpcert.or.jp"
"data_type" : "CVE", },
"data_version" : "4.0", "affects": {
"description" : { "vendor": {
"description_data" : [ "vendor_data": [
{ {
"lang" : "eng", "vendor_name": "BUFFALO INC.",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "product": {
} "product_data": [
] {
} "product_name": "WZR-1750DHP2",
"version": {
"version_data": [
{
"version_value": "Ver.2.30 and earlier"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang": "eng",
"value":"Authentication bypass"
}
]
}
]
},
"references":{
"reference_data":[
{
"url":"http://buffalo.jp/support_s/s20180328.html"
},
{
"url":"http://jvn.jp/en/jp/JVN93397125/index.html"
}
]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"WZR-1750DHP2 Ver.2.30 and earlier allows an attacker to bypass authentication execute arbitrary commands on the device via unspecified vectors."
}
]
}
} }

View File

@ -1,18 +1,62 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2018-0555", "data_version": "4.0",
"STATE" : "RESERVED" "CVE_data_meta": {
}, "ID": "CVE-2018-0555",
"data_format" : "MITRE", "ASSIGNER": "vultures@jpcert.or.jp"
"data_type" : "CVE", },
"data_version" : "4.0", "affects": {
"description" : { "vendor": {
"description_data" : [ "vendor_data": [
{ {
"lang" : "eng", "vendor_name": "BUFFALO INC.",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "product": {
} "product_data": [
] {
} "product_name": "WZR-1750DHP2",
"version": {
"version_data": [
{
"version_value": "Ver.2.30 and earlier"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang": "eng",
"value":"Buffer Overflow"
}
]
}
]
},
"references":{
"reference_data":[
{
"url":"http://buffalo.jp/support_s/s20180328.html"
},
{
"url":"http://jvn.jp/en/jp/JVN93397125/index.html"
}
]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"Buffer overflow in WZR-1750DHP2 Ver.2.30 and earlier allows an attacker to execute arbitrary code via specially crafted file."
}
]
}
} }

View File

@ -1,18 +1,62 @@
{ {
"CVE_data_meta" : { "data_type": "CVE",
"ASSIGNER" : "cve@mitre.org", "data_format": "MITRE",
"ID" : "CVE-2018-0556", "data_version": "4.0",
"STATE" : "RESERVED" "CVE_data_meta": {
}, "ID": "CVE-2018-0556",
"data_format" : "MITRE", "ASSIGNER": "vultures@jpcert.or.jp"
"data_type" : "CVE", },
"data_version" : "4.0", "affects": {
"description" : { "vendor": {
"description_data" : [ "vendor_data": [
{ {
"lang" : "eng", "vendor_name": "BUFFALO INC.",
"value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." "product": {
} "product_data": [
] {
} "product_name": "WZR-1750DHP2",
"version": {
"version_data": [
{
"version_value": "Ver.2.30 and earlier"
}
]
}
}
]
}
}
]
}
},
"problemtype":{
"problemtype_data":[
{
"description":[
{
"lang": "eng",
"value":"OS Command Injection"
}
]
}
]
},
"references":{
"reference_data":[
{
"url":"http://buffalo.jp/support_s/s20180328.html"
},
{
"url":"http://jvn.jp/en/jp/JVN93397125/index.html"
}
]
},
"description":{
"description_data":[
{
"lang": "eng",
"value":"WZR-1750DHP2 Ver.2.30 and earlier allows an attacker to execute arbitrary OS commands via unspecified vectors."
}
]
}
} }