From 5c8a266da3178609535d15182c76fe967d911d00 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 1 May 2018 14:05:39 -0400 Subject: [PATCH] - Synchronized data. --- 2013/4xxx/CVE-2013-4035.json | 53 ++++++++++++- 2013/4xxx/CVE-2013-4040.json | 53 ++++++++++++- 2017/14xxx/CVE-2017-14012.json | 2 + 2017/14xxx/CVE-2017-14014.json | 2 + 2017/5xxx/CVE-2017-5535.json | 133 ++++++++++++++++----------------- 2017/5xxx/CVE-2017-5536.json | 133 ++++++++++++++++----------------- 2018/10xxx/CVE-2018-10364.json | 5 ++ 2018/10xxx/CVE-2018-10588.json | 18 +++++ 2018/10xxx/CVE-2018-10589.json | 18 +++++ 2018/10xxx/CVE-2018-10590.json | 18 +++++ 2018/10xxx/CVE-2018-10591.json | 18 +++++ 2018/10xxx/CVE-2018-10592.json | 18 +++++ 2018/10xxx/CVE-2018-10593.json | 18 +++++ 2018/10xxx/CVE-2018-10594.json | 18 +++++ 2018/10xxx/CVE-2018-10595.json | 18 +++++ 2018/10xxx/CVE-2018-10596.json | 18 +++++ 2018/10xxx/CVE-2018-10597.json | 18 +++++ 2018/10xxx/CVE-2018-10598.json | 18 +++++ 2018/10xxx/CVE-2018-10599.json | 18 +++++ 2018/10xxx/CVE-2018-10600.json | 18 +++++ 2018/10xxx/CVE-2018-10601.json | 18 +++++ 2018/10xxx/CVE-2018-10602.json | 18 +++++ 2018/10xxx/CVE-2018-10603.json | 18 +++++ 2018/10xxx/CVE-2018-10604.json | 18 +++++ 2018/10xxx/CVE-2018-10605.json | 18 +++++ 2018/10xxx/CVE-2018-10606.json | 18 +++++ 2018/10xxx/CVE-2018-10607.json | 18 +++++ 2018/10xxx/CVE-2018-10608.json | 18 +++++ 2018/10xxx/CVE-2018-10609.json | 18 +++++ 2018/10xxx/CVE-2018-10610.json | 18 +++++ 2018/10xxx/CVE-2018-10611.json | 18 +++++ 2018/10xxx/CVE-2018-10612.json | 18 +++++ 2018/10xxx/CVE-2018-10613.json | 18 +++++ 2018/10xxx/CVE-2018-10614.json | 18 +++++ 2018/10xxx/CVE-2018-10615.json | 18 +++++ 2018/10xxx/CVE-2018-10616.json | 18 +++++ 2018/10xxx/CVE-2018-10617.json | 18 +++++ 2018/10xxx/CVE-2018-10618.json | 18 +++++ 2018/10xxx/CVE-2018-10619.json | 18 +++++ 2018/10xxx/CVE-2018-10620.json | 18 +++++ 2018/10xxx/CVE-2018-10621.json | 18 +++++ 2018/10xxx/CVE-2018-10622.json | 18 +++++ 2018/10xxx/CVE-2018-10623.json | 18 +++++ 2018/10xxx/CVE-2018-10624.json | 18 +++++ 2018/10xxx/CVE-2018-10625.json | 18 +++++ 2018/10xxx/CVE-2018-10626.json | 18 +++++ 2018/10xxx/CVE-2018-10627.json | 18 +++++ 2018/10xxx/CVE-2018-10628.json | 18 +++++ 2018/10xxx/CVE-2018-10629.json | 18 +++++ 2018/10xxx/CVE-2018-10630.json | 18 +++++ 2018/10xxx/CVE-2018-10631.json | 18 +++++ 2018/10xxx/CVE-2018-10632.json | 18 +++++ 2018/10xxx/CVE-2018-10633.json | 18 +++++ 2018/10xxx/CVE-2018-10634.json | 18 +++++ 2018/10xxx/CVE-2018-10635.json | 18 +++++ 2018/10xxx/CVE-2018-10636.json | 18 +++++ 2018/10xxx/CVE-2018-10637.json | 18 +++++ 2018/6xxx/CVE-2018-6589.json | 1 + 2018/9xxx/CVE-2018-9232.json | 48 +++++++++++- 2018/9xxx/CVE-2018-9336.json | 63 +++++++++++++++- 60 files changed, 1251 insertions(+), 142 deletions(-) create mode 100644 2018/10xxx/CVE-2018-10588.json create mode 100644 2018/10xxx/CVE-2018-10589.json create mode 100644 2018/10xxx/CVE-2018-10590.json create mode 100644 2018/10xxx/CVE-2018-10591.json create mode 100644 2018/10xxx/CVE-2018-10592.json create mode 100644 2018/10xxx/CVE-2018-10593.json create mode 100644 2018/10xxx/CVE-2018-10594.json create mode 100644 2018/10xxx/CVE-2018-10595.json create mode 100644 2018/10xxx/CVE-2018-10596.json create mode 100644 2018/10xxx/CVE-2018-10597.json create mode 100644 2018/10xxx/CVE-2018-10598.json create mode 100644 2018/10xxx/CVE-2018-10599.json create mode 100644 2018/10xxx/CVE-2018-10600.json create mode 100644 2018/10xxx/CVE-2018-10601.json create mode 100644 2018/10xxx/CVE-2018-10602.json create mode 100644 2018/10xxx/CVE-2018-10603.json create mode 100644 2018/10xxx/CVE-2018-10604.json create mode 100644 2018/10xxx/CVE-2018-10605.json create mode 100644 2018/10xxx/CVE-2018-10606.json create mode 100644 2018/10xxx/CVE-2018-10607.json create mode 100644 2018/10xxx/CVE-2018-10608.json create mode 100644 2018/10xxx/CVE-2018-10609.json create mode 100644 2018/10xxx/CVE-2018-10610.json create mode 100644 2018/10xxx/CVE-2018-10611.json create mode 100644 2018/10xxx/CVE-2018-10612.json create mode 100644 2018/10xxx/CVE-2018-10613.json create mode 100644 2018/10xxx/CVE-2018-10614.json create mode 100644 2018/10xxx/CVE-2018-10615.json create mode 100644 2018/10xxx/CVE-2018-10616.json create mode 100644 2018/10xxx/CVE-2018-10617.json create mode 100644 2018/10xxx/CVE-2018-10618.json create mode 100644 2018/10xxx/CVE-2018-10619.json create mode 100644 2018/10xxx/CVE-2018-10620.json create mode 100644 2018/10xxx/CVE-2018-10621.json create mode 100644 2018/10xxx/CVE-2018-10622.json create mode 100644 2018/10xxx/CVE-2018-10623.json create mode 100644 2018/10xxx/CVE-2018-10624.json create mode 100644 2018/10xxx/CVE-2018-10625.json create mode 100644 2018/10xxx/CVE-2018-10626.json create mode 100644 2018/10xxx/CVE-2018-10627.json create mode 100644 2018/10xxx/CVE-2018-10628.json create mode 100644 2018/10xxx/CVE-2018-10629.json create mode 100644 2018/10xxx/CVE-2018-10630.json create mode 100644 2018/10xxx/CVE-2018-10631.json create mode 100644 2018/10xxx/CVE-2018-10632.json create mode 100644 2018/10xxx/CVE-2018-10633.json create mode 100644 2018/10xxx/CVE-2018-10634.json create mode 100644 2018/10xxx/CVE-2018-10635.json create mode 100644 2018/10xxx/CVE-2018-10636.json create mode 100644 2018/10xxx/CVE-2018-10637.json diff --git a/2013/4xxx/CVE-2013-4035.json b/2013/4xxx/CVE-2013-4035.json index b041eb92723..9ee1b4d6f77 100644 --- a/2013/4xxx/CVE-2013-4035.json +++ b/2013/4xxx/CVE-2013-4035.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2013-4035", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,33 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "IBM Sterling Connect:Direct for OpenVMS 3.4.00, 3.4.01, 3.5.00, 3.6.0, and 3.6.0.1 allow remote attackers to have unspecified impact by leveraging failure to reject client requests for an unencrypted session when used as the server in a TCP/IP session and configured for SSL encryption with the client. IBM X-Force ID: 86138." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-sterling-connectdirect-for-openvms-unencrypted-data-transfers-can-occur-even-when-ssl-encryption-is-specified-in-the-security-configuration-cve-2013-4035/", + "refsource" : "CONFIRM", + "url" : "https://www.ibm.com/blogs/psirt/security-bulletin-ibm-sterling-connectdirect-for-openvms-unencrypted-data-transfers-can-occur-even-when-ssl-encryption-is-specified-in-the-security-configuration-cve-2013-4035/" + }, + { + "name" : "scd-cve20134035-weak-security(86138)", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/86138" } ] } diff --git a/2013/4xxx/CVE-2013-4040.json b/2013/4xxx/CVE-2013-4040.json index e1bd5b435a6..2078fdb6c60 100644 --- a/2013/4xxx/CVE-2013-4040.json +++ b/2013/4xxx/CVE-2013-4040.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2013-4040", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,33 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "IBM Tivoli Application Dependency Discovery Manager (TADDM) 7.1.2.x before 7.2.1.5 and 7.2.x before 7.2.2.0 on Unix use weak permissions (755) for unspecified configuration and log files, which allows local users to obtain sensitive information by reading the files. IBM X-Force ID: 86176." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www-01.ibm.com/support/docview.wss?uid=swg21672253", + "refsource" : "CONFIRM", + "url" : "https://www-01.ibm.com/support/docview.wss?uid=swg21672253" + }, + { + "name" : "ibm-tivoli-cve20134040-info-disc(86176)", + "refsource" : "XF", + "url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/86176" } ] } diff --git a/2017/14xxx/CVE-2017-14012.json b/2017/14xxx/CVE-2017-14012.json index d0889831900..a8bcdd5d5b4 100644 --- a/2017/14xxx/CVE-2017-14012.json +++ b/2017/14xxx/CVE-2017-14012.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSMA-17-292-01", + "refsource" : "MISC", "url" : "https://ics-cert.us-cert.gov/advisories/ICSMA-17-292-01" } ] diff --git a/2017/14xxx/CVE-2017-14014.json b/2017/14xxx/CVE-2017-14014.json index 665d6bde139..c020a99eba5 100644 --- a/2017/14xxx/CVE-2017-14014.json +++ b/2017/14xxx/CVE-2017-14014.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSMA-17-292-01", + "refsource" : "MISC", "url" : "https://ics-cert.us-cert.gov/advisories/ICSMA-17-292-01" } ] diff --git a/2017/5xxx/CVE-2017-5535.json b/2017/5xxx/CVE-2017-5535.json index 269130f3f9c..dd87d7317c3 100644 --- a/2017/5xxx/CVE-2017-5535.json +++ b/2017/5xxx/CVE-2017-5535.json @@ -1,115 +1,114 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@tibco.com", - "DATE_PUBLIC": "2018-05-01T16:00:00.000Z", - "ID": "CVE-2017-5535", - "STATE": "PUBLIC", - "TITLE": "TIBCO DataSynapse GridServer improper use of encryption" + "CVE_data_meta" : { + "ASSIGNER" : "security@tibco.com", + "DATE_PUBLIC" : "2018-05-01T16:00:00.000Z", + "ID" : "CVE-2017-5535", + "STATE" : "PUBLIC", + "TITLE" : "TIBCO DataSynapse GridServer improper use of encryption" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "TIBCO DataSynapse GridServer Manager", - "version": { - "version_data": [ + "product_name" : "TIBCO DataSynapse GridServer Manager", + "version" : { + "version_data" : [ { - "affected": "<=", - "version_value": "5.1.3" + "affected" : "<=", + "version_value" : "5.1.3" }, { - "affected": "=", - "version_value": "6.0.0" + "affected" : "=", + "version_value" : "6.0.0" }, { - "affected": "=", - "version_value": "6.0.1" + "affected" : "=", + "version_value" : "6.0.1" }, { - "affected": "=", - "version_value": "6.0.2" + "affected" : "=", + "version_value" : "6.0.2" }, { - "affected": "=", - "version_value": "6.1.0" + "affected" : "=", + "version_value" : "6.1.0" }, { - "affected": "=", - "version_value": "6.1.1" + "affected" : "=", + "version_value" : "6.1.1" }, { - "affected": "=", - "version_value": "6.2.0" + "affected" : "=", + "version_value" : "6.2.0" } ] } } ] }, - "vendor_name": "TIBCO Software Inc." + "vendor_name" : "TIBCO Software Inc." } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "The GridServer Broker, GridServer Driver, and GridServer Engine components of TIBCO Software Inc. TIBCO DataSynapse GridServer Manager contain vulnerabiities related to both the improper use of encryption mechanisms and the use of weak ciphers. A malicious actor could theoretically compromise the traffic between any of the components.\nAffected releases include TIBCO Software Inc.'s TIBCO DataSynapse GridServer Manager: versions up to and including 5.1.3; 6.0.0; 6.0.1; 6.0.2; 6.1.0; 6.1.1; and 6.2.0." + "lang" : "eng", + "value" : "The GridServer Broker, GridServer Driver, and GridServer Engine components of TIBCO Software Inc. TIBCO DataSynapse GridServer Manager contain vulnerabilities related to both the improper use of encryption mechanisms and the use of weak ciphers. A malicious actor could theoretically compromise the traffic between any of the components. Affected releases include TIBCO Software Inc.'s TIBCO DataSynapse GridServer Manager: versions up to and including 5.1.3; 6.0.0; 6.0.1; 6.0.2; 6.1.0; 6.1.1; and 6.2.0." } ] }, - "impact": { - "cvss": { - "attackComplexity": "HIGH", - "attackVector": "ADJACENT_NETWORK", - "availabilityImpact": "NONE", - "baseScore": 6.8, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "HIGH", - "integrityImpact": "HIGH", - "privilegesRequired": "NONE", - "scope": "UNCHANGED", - "userInteraction": "NONE", - "vectorString": "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "HIGH", + "attackVector" : "ADJACENT_NETWORK", + "availabilityImpact" : "NONE", + "baseScore" : 6.8, + "baseSeverity" : "MEDIUM", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "HIGH", + "privilegesRequired" : "NONE", + "scope" : "UNCHANGED", + "userInteraction" : "NONE", + "vectorString" : "CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "A user with access to network traffic between the affected components could potentially examine that traffic, including passwords used to encrypt further communications." + "lang" : "eng", + "value" : "A user with access to network traffic between the affected components could potentially examine that traffic, including passwords used to encrypt further communications." } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "url": "http://www.tibco.com/services/support/advisories" - }, - { - "url": "https://www.tibco.com/support/advisories/2018/05/security-advisory-may-1-2018-tibco-datasynapse-gridserver-2017-5535" + "name" : "https://www.tibco.com/support/advisories/2018/05/security-advisory-may-1-2018-tibco-datasynapse-gridserver-2017-5535", + "refsource" : "CONFIRM", + "url" : "https://www.tibco.com/support/advisories/2018/05/security-advisory-may-1-2018-tibco-datasynapse-gridserver-2017-5535" } ] }, - "solution": [ + "solution" : [ { - "lang": "eng", - "value": "TIBCO has released updated versions of the affected components which address these issues. For each affected system, update to the corresponding software versions:\n\nTIBCO DataSynapse GridServer Manager versions 5.1.3 and below update to version 5.2.0 or higher\nTIBCO DataSynapse GridServer Manager versions 6.0.0, 6.0.1, and 6.0.2 update to version 6.3.0 or higher\nTIBCO DataSynapse GridServer Manager versions 6.1.0, and 6.1.1 update to version 6.3.0 or higher\nTIBCO DataSynapse GridServer Manager version 6.2.0 update to version 6.3.0 or higher" + "lang" : "eng", + "value" : "TIBCO has released updated versions of the affected components which address these issues. For each affected system, update to the corresponding software versions:\n\nTIBCO DataSynapse GridServer Manager versions 5.1.3 and below update to version 5.2.0 or higher\nTIBCO DataSynapse GridServer Manager versions 6.0.0, 6.0.1, and 6.0.2 update to version 6.3.0 or higher\nTIBCO DataSynapse GridServer Manager versions 6.1.0, and 6.1.1 update to version 6.3.0 or higher\nTIBCO DataSynapse GridServer Manager version 6.2.0 update to version 6.3.0 or higher" } ], - "source": { - "discovery": "UNKNOWN" + "source" : { + "discovery" : "UNKNOWN" } -} \ No newline at end of file +} diff --git a/2017/5xxx/CVE-2017-5536.json b/2017/5xxx/CVE-2017-5536.json index 246e6dd9440..1bd88bff9c5 100644 --- a/2017/5xxx/CVE-2017-5536.json +++ b/2017/5xxx/CVE-2017-5536.json @@ -1,115 +1,114 @@ { - "CVE_data_meta": { - "ASSIGNER": "security@tibco.com", - "DATE_PUBLIC": "2018-05-01T16:00:00.000Z", - "ID": "CVE-2017-5536", - "STATE": "PUBLIC", - "TITLE": "TIBCO DataSynapse GridServer manager component vulnerable to cross-site scripting attacks" + "CVE_data_meta" : { + "ASSIGNER" : "security@tibco.com", + "DATE_PUBLIC" : "2018-05-01T16:00:00.000Z", + "ID" : "CVE-2017-5536", + "STATE" : "PUBLIC", + "TITLE" : "TIBCO DataSynapse GridServer manager component vulnerable to cross-site scripting attacks" }, - "affects": { - "vendor": { - "vendor_data": [ + "affects" : { + "vendor" : { + "vendor_data" : [ { - "product": { - "product_data": [ + "product" : { + "product_data" : [ { - "product_name": "TIBCO DataSynapse GridServer Manager", - "version": { - "version_data": [ + "product_name" : "TIBCO DataSynapse GridServer Manager", + "version" : { + "version_data" : [ { - "affected": "<=", - "version_value": "5.1.3" + "affected" : "<=", + "version_value" : "5.1.3" }, { - "affected": "=", - "version_value": "6.0.0" + "affected" : "=", + "version_value" : "6.0.0" }, { - "affected": "=", - "version_value": "6.0.1" + "affected" : "=", + "version_value" : "6.0.1" }, { - "affected": "=", - "version_value": "6.0.2" + "affected" : "=", + "version_value" : "6.0.2" }, { - "affected": "=", - "version_value": "6.1.0" + "affected" : "=", + "version_value" : "6.1.0" }, { - "affected": "=", - "version_value": "6.1.1" + "affected" : "=", + "version_value" : "6.1.1" }, { - "affected": "=", - "version_value": "6.2.0" + "affected" : "=", + "version_value" : "6.2.0" } ] } } ] }, - "vendor_name": "TIBCO Software Inc." + "vendor_name" : "TIBCO Software Inc." } ] } }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ { - "lang": "eng", - "value": "The GridServer Broker, and GridServer Director components of TIBCO Software Inc. TIBCO DataSynapse GridServer Manager contain vulnerabilities which may allow an authenticated user to perform cross-site scripting (XSS). In addition, an authenticated user could be a victim of a cross-site request forgery (CSRF) attack..\n\nAffected releases include TIBCO Software Inc.'s TIBCO DataSynapse GridServer Manager: versions up to and including 5.1.3; 6.0.0; 6.0.1; 6.0.2; 6.1.0; 6.1.1; and 6.2.0.\n" + "lang" : "eng", + "value" : "The GridServer Broker, and GridServer Director components of TIBCO Software Inc. TIBCO DataSynapse GridServer Manager contain vulnerabilities which may allow an authenticated user to perform cross-site scripting (XSS). In addition, an authenticated user could be a victim of a cross-site request forgery (CSRF) attack. Affected releases include TIBCO Software Inc.'s TIBCO DataSynapse GridServer Manager: versions up to and including 5.1.3; 6.0.0; 6.0.1; 6.0.2; 6.1.0; 6.1.1; and 6.2.0." } ] }, - "impact": { - "cvss": { - "attackComplexity": "LOW", - "attackVector": "NETWORK", - "availabilityImpact": "NONE", - "baseScore": 6.3, - "baseSeverity": "MEDIUM", - "confidentialityImpact": "HIGH", - "integrityImpact": "LOW", - "privilegesRequired": "LOW", - "scope": "UNCHANGED", - "userInteraction": "REQUIRED", - "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N", - "version": "3.0" + "impact" : { + "cvss" : { + "attackComplexity" : "LOW", + "attackVector" : "NETWORK", + "availabilityImpact" : "NONE", + "baseScore" : 6.3, + "baseSeverity" : "MEDIUM", + "confidentialityImpact" : "HIGH", + "integrityImpact" : "LOW", + "privilegesRequired" : "LOW", + "scope" : "UNCHANGED", + "userInteraction" : "REQUIRED", + "vectorString" : "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:L/A:N", + "version" : "3.0" } }, - "problemtype": { - "problemtype_data": [ + "problemtype" : { + "problemtype_data" : [ { - "description": [ + "description" : [ { - "lang": "eng", - "value": "The impact of this vulnerability includes the possibility that a malicious actor could gain access to a more privileged account on the affected components or the information managed by those components." + "lang" : "eng", + "value" : "The impact of this vulnerability includes the possibility that a malicious actor could gain access to a more privileged account on the affected components or the information managed by those components." } ] } ] }, - "references": { - "reference_data": [ + "references" : { + "reference_data" : [ { - "url": "http://www.tibco.com/services/support/advisories" - }, - { - "url": "https://www.tibco.com/support/advisories/2018/05/security-advisory-may-1-2018-tibco-datasynapse-gridserver-2017-5536" + "name" : "https://www.tibco.com/support/advisories/2018/05/security-advisory-may-1-2018-tibco-datasynapse-gridserver-2017-5536", + "refsource" : "CONFIRM", + "url" : "https://www.tibco.com/support/advisories/2018/05/security-advisory-may-1-2018-tibco-datasynapse-gridserver-2017-5536" } ] }, - "solution": [ + "solution" : [ { - "lang": "eng", - "value": "TIBCO has released updated versions of the affected components which address these issues. For each affected system, update to the corresponding software versions:\n\nTIBCO DataSynapse GridServer Manager versions 5.1.3 and below update to version 5.2.0 or higher\nTIBCO DataSynapse GridServer Manager versions 6.0.0, 6.0.1, and 6.0.2 update to version 6.3.0 or higher\nTIBCO DataSynapse GridServer Manager versions 6.1.0, and 6.1.1 update to version 6.3.0 or higher\nTIBCO DataSynapse GridServer Manager version 6.2.0 update to version 6.3.0 or higher" + "lang" : "eng", + "value" : "TIBCO has released updated versions of the affected components which address these issues. For each affected system, update to the corresponding software versions:\n\nTIBCO DataSynapse GridServer Manager versions 5.1.3 and below update to version 5.2.0 or higher\nTIBCO DataSynapse GridServer Manager versions 6.0.0, 6.0.1, and 6.0.2 update to version 6.3.0 or higher\nTIBCO DataSynapse GridServer Manager versions 6.1.0, and 6.1.1 update to version 6.3.0 or higher\nTIBCO DataSynapse GridServer Manager version 6.2.0 update to version 6.3.0 or higher" } ], - "source": { - "discovery": "UNKNOWN" + "source" : { + "discovery" : "UNKNOWN" } -} \ No newline at end of file +} diff --git a/2018/10xxx/CVE-2018-10364.json b/2018/10xxx/CVE-2018-10364.json index 185281d96c5..81004f1082b 100644 --- a/2018/10xxx/CVE-2018-10364.json +++ b/2018/10xxx/CVE-2018-10364.json @@ -61,6 +61,11 @@ "name" : "https://github.com/bigtreecms/BigTree-CMS/issues/332", "refsource" : "MISC", "url" : "https://github.com/bigtreecms/BigTree-CMS/issues/332" + }, + { + "name" : "https://github.com/bigtreecms/BigTree-CMS#changelog", + "refsource" : "CONFIRM", + "url" : "https://github.com/bigtreecms/BigTree-CMS#changelog" } ] } diff --git a/2018/10xxx/CVE-2018-10588.json b/2018/10xxx/CVE-2018-10588.json new file mode 100644 index 00000000000..090207edddb --- /dev/null +++ b/2018/10xxx/CVE-2018-10588.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10588", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10589.json b/2018/10xxx/CVE-2018-10589.json new file mode 100644 index 00000000000..4300fb5db93 --- /dev/null +++ b/2018/10xxx/CVE-2018-10589.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10589", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10590.json b/2018/10xxx/CVE-2018-10590.json new file mode 100644 index 00000000000..cced5256f30 --- /dev/null +++ b/2018/10xxx/CVE-2018-10590.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10590", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10591.json b/2018/10xxx/CVE-2018-10591.json new file mode 100644 index 00000000000..492527d0fbf --- /dev/null +++ b/2018/10xxx/CVE-2018-10591.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10591", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10592.json b/2018/10xxx/CVE-2018-10592.json new file mode 100644 index 00000000000..76cf9d3d0f6 --- /dev/null +++ b/2018/10xxx/CVE-2018-10592.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10592", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10593.json b/2018/10xxx/CVE-2018-10593.json new file mode 100644 index 00000000000..2b7bc70356b --- /dev/null +++ b/2018/10xxx/CVE-2018-10593.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10593", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10594.json b/2018/10xxx/CVE-2018-10594.json new file mode 100644 index 00000000000..50e20b3fbc0 --- /dev/null +++ b/2018/10xxx/CVE-2018-10594.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10594", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10595.json b/2018/10xxx/CVE-2018-10595.json new file mode 100644 index 00000000000..fe9badee503 --- /dev/null +++ b/2018/10xxx/CVE-2018-10595.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10595", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10596.json b/2018/10xxx/CVE-2018-10596.json new file mode 100644 index 00000000000..7e3cddb49b9 --- /dev/null +++ b/2018/10xxx/CVE-2018-10596.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10596", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10597.json b/2018/10xxx/CVE-2018-10597.json new file mode 100644 index 00000000000..58424377783 --- /dev/null +++ b/2018/10xxx/CVE-2018-10597.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10597", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10598.json b/2018/10xxx/CVE-2018-10598.json new file mode 100644 index 00000000000..a15f73f077b --- /dev/null +++ b/2018/10xxx/CVE-2018-10598.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10598", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10599.json b/2018/10xxx/CVE-2018-10599.json new file mode 100644 index 00000000000..9ad8d63f079 --- /dev/null +++ b/2018/10xxx/CVE-2018-10599.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10599", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10600.json b/2018/10xxx/CVE-2018-10600.json new file mode 100644 index 00000000000..575d7a57f24 --- /dev/null +++ b/2018/10xxx/CVE-2018-10600.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10600", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10601.json b/2018/10xxx/CVE-2018-10601.json new file mode 100644 index 00000000000..f0c7a3d4277 --- /dev/null +++ b/2018/10xxx/CVE-2018-10601.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10601", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10602.json b/2018/10xxx/CVE-2018-10602.json new file mode 100644 index 00000000000..227ff86b718 --- /dev/null +++ b/2018/10xxx/CVE-2018-10602.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10602", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10603.json b/2018/10xxx/CVE-2018-10603.json new file mode 100644 index 00000000000..750151d243a --- /dev/null +++ b/2018/10xxx/CVE-2018-10603.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10603", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10604.json b/2018/10xxx/CVE-2018-10604.json new file mode 100644 index 00000000000..1e3c334d070 --- /dev/null +++ b/2018/10xxx/CVE-2018-10604.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10604", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10605.json b/2018/10xxx/CVE-2018-10605.json new file mode 100644 index 00000000000..4fd61cdcf6d --- /dev/null +++ b/2018/10xxx/CVE-2018-10605.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10605", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10606.json b/2018/10xxx/CVE-2018-10606.json new file mode 100644 index 00000000000..84fc1157556 --- /dev/null +++ b/2018/10xxx/CVE-2018-10606.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10606", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10607.json b/2018/10xxx/CVE-2018-10607.json new file mode 100644 index 00000000000..9ae20e62da3 --- /dev/null +++ b/2018/10xxx/CVE-2018-10607.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10607", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10608.json b/2018/10xxx/CVE-2018-10608.json new file mode 100644 index 00000000000..83656f831a2 --- /dev/null +++ b/2018/10xxx/CVE-2018-10608.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10608", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10609.json b/2018/10xxx/CVE-2018-10609.json new file mode 100644 index 00000000000..37e45228bdd --- /dev/null +++ b/2018/10xxx/CVE-2018-10609.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10609", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10610.json b/2018/10xxx/CVE-2018-10610.json new file mode 100644 index 00000000000..b2f6ba595ba --- /dev/null +++ b/2018/10xxx/CVE-2018-10610.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10610", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10611.json b/2018/10xxx/CVE-2018-10611.json new file mode 100644 index 00000000000..d15747f1522 --- /dev/null +++ b/2018/10xxx/CVE-2018-10611.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10611", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10612.json b/2018/10xxx/CVE-2018-10612.json new file mode 100644 index 00000000000..e92edd8d76f --- /dev/null +++ b/2018/10xxx/CVE-2018-10612.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10612", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10613.json b/2018/10xxx/CVE-2018-10613.json new file mode 100644 index 00000000000..779c2115987 --- /dev/null +++ b/2018/10xxx/CVE-2018-10613.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10613", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10614.json b/2018/10xxx/CVE-2018-10614.json new file mode 100644 index 00000000000..09648e789b9 --- /dev/null +++ b/2018/10xxx/CVE-2018-10614.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10614", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10615.json b/2018/10xxx/CVE-2018-10615.json new file mode 100644 index 00000000000..2873b50226b --- /dev/null +++ b/2018/10xxx/CVE-2018-10615.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10615", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10616.json b/2018/10xxx/CVE-2018-10616.json new file mode 100644 index 00000000000..8dbf4e01303 --- /dev/null +++ b/2018/10xxx/CVE-2018-10616.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10616", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10617.json b/2018/10xxx/CVE-2018-10617.json new file mode 100644 index 00000000000..d74212b49c2 --- /dev/null +++ b/2018/10xxx/CVE-2018-10617.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10617", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10618.json b/2018/10xxx/CVE-2018-10618.json new file mode 100644 index 00000000000..08fe3238d05 --- /dev/null +++ b/2018/10xxx/CVE-2018-10618.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10618", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10619.json b/2018/10xxx/CVE-2018-10619.json new file mode 100644 index 00000000000..fe61298a38c --- /dev/null +++ b/2018/10xxx/CVE-2018-10619.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10619", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10620.json b/2018/10xxx/CVE-2018-10620.json new file mode 100644 index 00000000000..9052256907e --- /dev/null +++ b/2018/10xxx/CVE-2018-10620.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10620", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10621.json b/2018/10xxx/CVE-2018-10621.json new file mode 100644 index 00000000000..767f5b82317 --- /dev/null +++ b/2018/10xxx/CVE-2018-10621.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10621", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10622.json b/2018/10xxx/CVE-2018-10622.json new file mode 100644 index 00000000000..d39f2c6e97e --- /dev/null +++ b/2018/10xxx/CVE-2018-10622.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10622", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10623.json b/2018/10xxx/CVE-2018-10623.json new file mode 100644 index 00000000000..1f2f7f88b39 --- /dev/null +++ b/2018/10xxx/CVE-2018-10623.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10623", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10624.json b/2018/10xxx/CVE-2018-10624.json new file mode 100644 index 00000000000..14f0333217e --- /dev/null +++ b/2018/10xxx/CVE-2018-10624.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10624", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10625.json b/2018/10xxx/CVE-2018-10625.json new file mode 100644 index 00000000000..ca98d34e6b9 --- /dev/null +++ b/2018/10xxx/CVE-2018-10625.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10625", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10626.json b/2018/10xxx/CVE-2018-10626.json new file mode 100644 index 00000000000..37d0eabc04b --- /dev/null +++ b/2018/10xxx/CVE-2018-10626.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10626", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10627.json b/2018/10xxx/CVE-2018-10627.json new file mode 100644 index 00000000000..17ab8149e53 --- /dev/null +++ b/2018/10xxx/CVE-2018-10627.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10627", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10628.json b/2018/10xxx/CVE-2018-10628.json new file mode 100644 index 00000000000..c40dc3acfbd --- /dev/null +++ b/2018/10xxx/CVE-2018-10628.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10628", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10629.json b/2018/10xxx/CVE-2018-10629.json new file mode 100644 index 00000000000..fefd4f788de --- /dev/null +++ b/2018/10xxx/CVE-2018-10629.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10629", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10630.json b/2018/10xxx/CVE-2018-10630.json new file mode 100644 index 00000000000..5ba091979b5 --- /dev/null +++ b/2018/10xxx/CVE-2018-10630.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10630", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10631.json b/2018/10xxx/CVE-2018-10631.json new file mode 100644 index 00000000000..6f0037d7738 --- /dev/null +++ b/2018/10xxx/CVE-2018-10631.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10631", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10632.json b/2018/10xxx/CVE-2018-10632.json new file mode 100644 index 00000000000..6092f11d021 --- /dev/null +++ b/2018/10xxx/CVE-2018-10632.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10632", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10633.json b/2018/10xxx/CVE-2018-10633.json new file mode 100644 index 00000000000..59c16570b09 --- /dev/null +++ b/2018/10xxx/CVE-2018-10633.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10633", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10634.json b/2018/10xxx/CVE-2018-10634.json new file mode 100644 index 00000000000..91d6eadeea4 --- /dev/null +++ b/2018/10xxx/CVE-2018-10634.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10634", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10635.json b/2018/10xxx/CVE-2018-10635.json new file mode 100644 index 00000000000..95ac102b94c --- /dev/null +++ b/2018/10xxx/CVE-2018-10635.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10635", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10636.json b/2018/10xxx/CVE-2018-10636.json new file mode 100644 index 00000000000..5a22cbe12a0 --- /dev/null +++ b/2018/10xxx/CVE-2018-10636.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10636", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10637.json b/2018/10xxx/CVE-2018-10637.json new file mode 100644 index 00000000000..9c58757c4b4 --- /dev/null +++ b/2018/10xxx/CVE-2018-10637.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10637", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/6xxx/CVE-2018-6589.json b/2018/6xxx/CVE-2018-6589.json index 28b00fd1980..c377e993b1b 100644 --- a/2018/6xxx/CVE-2018-6589.json +++ b/2018/6xxx/CVE-2018-6589.json @@ -60,6 +60,7 @@ "references" : { "reference_data" : [ { + "name" : "https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20180501-01--security-notice-for-ca-spectrum.html", "refsource" : "CONFIRM", "url" : "https://support.ca.com/us/product-content/recommended-reading/security-notices/ca20180501-01--security-notice-for-ca-spectrum.html" } diff --git a/2018/9xxx/CVE-2018-9232.json b/2018/9xxx/CVE-2018-9232.json index e6b9835a70e..3cdacba6868 100644 --- a/2018/9xxx/CVE-2018-9232.json +++ b/2018/9xxx/CVE-2018-9232.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-9232", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Due to the lack of firmware authentication in the upgrade process of T&W WIFI Repeater BE126 devices, an attacker can craft a malicious firmware and use it as an update." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.digitalwhisper.co.il/files/Zines/0x5E/DW94-3-Repeater2.pdf", + "refsource" : "MISC", + "url" : "https://www.digitalwhisper.co.il/files/Zines/0x5E/DW94-3-Repeater2.pdf" } ] } diff --git a/2018/9xxx/CVE-2018-9336.json b/2018/9xxx/CVE-2018-9336.json index 7d49f0dd47f..6105390b021 100644 --- a/2018/9xxx/CVE-2018-9336.json +++ b/2018/9xxx/CVE-2018-9336.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-9336", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,43 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "openvpnserv.exe (aka the interactive service helper) in OpenVPN 2.4.x before 2.4.6 allows a local attacker to cause a double-free of memory by sending a malformed request to the interactive service. This could cause a denial-of-service through memory corruption or possibly have unspecified other impact including privilege escalation." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24", + "refsource" : "CONFIRM", + "url" : "https://community.openvpn.net/openvpn/wiki/ChangesInOpenvpn24" + }, + { + "name" : "https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b", + "refsource" : "CONFIRM", + "url" : "https://github.com/OpenVPN/openvpn/commit/1394192b210cb3c6624a7419bcf3ff966742e79b" + }, + { + "name" : "https://github.com/OpenVPN/openvpn/releases/tag/v2.4.6", + "refsource" : "CONFIRM", + "url" : "https://github.com/OpenVPN/openvpn/releases/tag/v2.4.6" + }, + { + "name" : "SSA:2018-116-01", + "refsource" : "SLACKWARE", + "url" : "http://www.slackware.com/security/viewer.php?l=slackware-security&y=2018&m=slackware-security.568761" } ] }