CVE-2018-1000213 is a REJECT, use CVE-2018-1999023 instead

This commit is contained in:
Kurt Seifried 2018-08-20 11:12:51 -06:00
parent 8ceadb57ef
commit 5e5dde72d8
No known key found for this signature in database
GPG Key ID: F15CADC4A00F8174

View File

@ -1 +1,19 @@
{ "CVE_data_meta": { "ASSIGNER": "kurt@seifried.org", "DATE_ASSIGNED": "2018-08-02T16:41:53.502394", "DATE_REQUESTED": "2018-07-21T05:38:45", "ID": "CVE-2018-1000213", "REQUESTER": "shadowm2006@gmail.com" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "The Battle for Wesnoth", "version": { "version_data": [ { "version_value": "1.7.0 - 1.14.3" } ] } } ] }, "vendor_name": "The Battle for Wesnoth Project" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Battle for Wesnoth Project The Battle for Wesnoth version 1.7.0 - 1.14.3 contains a Code Injection vulnerability in Lua scripting engine that can result in Severe. This attack appear to be exploitable via Loading specially-crafted saved games, networked games, replays, and player content." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Code Injection" } ] } ] }, "references": { "reference_data": [ { "url": "https://gist.github.com/shikadiqueen/45951ddc981cf8e0d9a74e4b30400380" } ] } }
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"DATE_ASSIGNED" : "2018-08-02T16:41:53.497929",
"ID" : "CVE-2018-1000213",
"STATE" : "REJECT"
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2018-1999023. Reason: This candidate is a reservation duplicate of CVE-2018-1999023. Notes: All CVE users should reference CVE-2018-1999023 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
}
]
}
}