diff --git a/2018/18xxx/CVE-2018-18904.json b/2018/18xxx/CVE-2018-18904.json new file mode 100644 index 00000000000..b80bbba0a68 --- /dev/null +++ b/2018/18xxx/CVE-2018-18904.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18904", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18905.json b/2018/18xxx/CVE-2018-18905.json new file mode 100644 index 00000000000..f1260273120 --- /dev/null +++ b/2018/18xxx/CVE-2018-18905.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18905", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18906.json b/2018/18xxx/CVE-2018-18906.json new file mode 100644 index 00000000000..37b168721ff --- /dev/null +++ b/2018/18xxx/CVE-2018-18906.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18906", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/7xxx/CVE-2018-7799.json b/2018/7xxx/CVE-2018-7799.json index bcc6406e411..0d18f62f38d 100644 --- a/2018/7xxx/CVE-2018-7799.json +++ b/2018/7xxx/CVE-2018-7799.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "A DLL hijacking vulnerability exists in Schneider Electric Software Update (SESU), all versions prior to V2.2.0, which could allow an attacker to execute arbitrary code on the targeted system when placing a specific DLL file. Schneider Electric Software Update (SESU) is installed by the following Schneider Electric software: Acti 9 Smart Test, AltivarATV320DtmLibrary, AltivarDTMLibrary, AltivarMachine340DTMLibrary, AltivarProcessATV6xxDTMLibrary, AltivarProcessATV9xxDTMLibrary, Blue, CompactNSX Firmware Update, Ecodial Advance Calculation, eConfigure, Ecoreach Software, EcoStruxure Modicon Builder, eXLhoist Configuration Software, Lexium 26 DTM Library, Lexium 28 DTM Library, Lexium 32 DTM Library, LV Motor Starter, PowerSCADA Expert, Schneider Electric Floating License Manager, Schneider Electric License Manager, Schneider Electric Motion Sizer, Schneider Electric SQL Gateway, SoMachine Basic, SoMachine Motion Software, SoMachine Motion Tools V4.3, SoMachine Software, SoMove, SoSafe Configurable, SoSafe Programmable V2.1, TeSysDTM, Unity Loader, Unity Pro, Vijeo Citect, Vijeo Designer, Vijeo Designer Opti 6.1, Vijeo XD, Web Gate Client Files" + "value" : "A DLL hijacking vulnerability exists in Schneider Electric Software Update (SESU), all versions prior to V2.2.0, which could allow an attacker to execute arbitrary code on the targeted system when placing a specific DLL file." } ] },