diff --git a/2018/11xxx/CVE-2018-11590.json b/2018/11xxx/CVE-2018-11590.json new file mode 100644 index 00000000000..38435ae6bb0 --- /dev/null +++ b/2018/11xxx/CVE-2018-11590.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11590", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via an integer overflow during syntax parsing. This was addressed by fixing stack size detection on Linux in jsutils.c." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/espruino/Espruino/commit/a0d7f432abee692402c00e8b615ff5982dde9780", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/commit/a0d7f432abee692402c00e8b615ff5982dde9780" + }, + { + "name" : "https://github.com/espruino/Espruino/files/2019243/so_0.txt", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/files/2019243/so_0.txt" + }, + { + "name" : "https://github.com/espruino/Espruino/issues/1427", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/issues/1427" + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11591.json b/2018/11xxx/CVE-2018-11591.json new file mode 100644 index 00000000000..fb93d87c51d --- /dev/null +++ b/2018/11xxx/CVE-2018-11591.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11591", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via a NULL pointer dereference during syntax parsing. This was addressed by adding validation for a debug trace print statement in jsvar.c." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/espruino/Espruino/commit/b6d362f6a1f2de0b3e7604848116efb509196bf4", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/commit/b6d362f6a1f2de0b3e7604848116efb509196bf4" + }, + { + "name" : "https://github.com/espruino/Espruino/files/2015612/test.txt", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/files/2015612/test.txt" + }, + { + "name" : "https://github.com/espruino/Espruino/issues/1420", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/issues/1420" + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11592.json b/2018/11xxx/CVE-2018-11592.json new file mode 100644 index 00000000000..638cd4325d9 --- /dev/null +++ b/2018/11xxx/CVE-2018-11592.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11592", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Espruino before 1.98 allows attackers to cause a denial of service (application crash) with a user crafted input file via an Out-of-bounds Read during syntax parsing in which certain height validation is missing in libs/graphics/jswrap_graphics.c." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/espruino/Espruino/commit/8a44b04b584b3d3ab1cb68fed410f7ecb165e50e", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/commit/8a44b04b584b3d3ab1cb68fed410f7ecb165e50e" + }, + { + "name" : "https://github.com/espruino/Espruino/files/2015630/test_0.txt", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/files/2015630/test_0.txt" + }, + { + "name" : "https://github.com/espruino/Espruino/issues/1421", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/issues/1421" + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11593.json b/2018/11xxx/CVE-2018-11593.json new file mode 100644 index 00000000000..20b7e4c475a --- /dev/null +++ b/2018/11xxx/CVE-2018-11593.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11593", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Espruino before 1.99 allows attackers to cause a denial of service (application crash) and potential Information Disclosure with a user crafted input file via a Buffer Overflow during syntax parsing because strncpy is misused in jslex.c." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/espruino/Espruino/commit/bed844f109b6c222816740555068de2e101e8018", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/commit/bed844f109b6c222816740555068de2e101e8018" + }, + { + "name" : "https://github.com/espruino/Espruino/files/2019228/eh_0.txt", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/files/2019228/eh_0.txt" + }, + { + "name" : "https://github.com/espruino/Espruino/issues/1426", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/issues/1426" + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11594.json b/2018/11xxx/CVE-2018-11594.json new file mode 100644 index 00000000000..52c92705885 --- /dev/null +++ b/2018/11xxx/CVE-2018-11594.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11594", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via a Buffer Overflow during syntax parsing of \"VOID\" tokens in jsparse.c." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/espruino/Espruino/commit/c36d30529118aa049797db43f111ddad468aad29", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/commit/c36d30529118aa049797db43f111ddad468aad29" + }, + { + "name" : "https://github.com/espruino/Espruino/files/2022588/input.txt", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/files/2022588/input.txt" + }, + { + "name" : "https://github.com/espruino/Espruino/issues/1434", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/issues/1434" + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11595.json b/2018/11xxx/CVE-2018-11595.json new file mode 100644 index 00000000000..07bc10541d7 --- /dev/null +++ b/2018/11xxx/CVE-2018-11595.json @@ -0,0 +1,82 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11595", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Espruino before 1.99 allows attackers to cause a denial of service (application crash) and a potential Escalation of Privileges with a user crafted input file via a Buffer Overflow during syntax parsing, because strncat is misused." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/espruino/Espruino/commit/0a7619875bf79877907205f6bee08465b89ff10b", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/commit/0a7619875bf79877907205f6bee08465b89ff10b" + }, + { + "name" : "https://github.com/espruino/Espruino/files/2019210/test_0.txt", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/files/2019210/test_0.txt" + }, + { + "name" : "https://github.com/espruino/Espruino/files/2019216/test_2.txt", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/files/2019216/test_2.txt" + }, + { + "name" : "https://github.com/espruino/Espruino/files/2019220/test_4.txt", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/files/2019220/test_4.txt" + }, + { + "name" : "https://github.com/espruino/Espruino/issues/1425", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/issues/1425" + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11596.json b/2018/11xxx/CVE-2018-11596.json new file mode 100644 index 00000000000..3af5e6a08b7 --- /dev/null +++ b/2018/11xxx/CVE-2018-11596.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11596", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via a Buffer Overflow during syntax parsing because a check for '\\0' is made for the wrong array element in jsvar.c." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/espruino/Espruino/commit/ce1924193862d58cb43d3d4d9dada710a8361b89", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/commit/ce1924193862d58cb43d3d4d9dada710a8361b89" + }, + { + "name" : "https://github.com/espruino/Espruino/issues/1435", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/issues/1435" + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11597.json b/2018/11xxx/CVE-2018-11597.json new file mode 100644 index 00000000000..b6ce334e8c6 --- /dev/null +++ b/2018/11xxx/CVE-2018-11597.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11597", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Espruino before 1.99 allows attackers to cause a denial of service (application crash) with a user crafted input file via a Buffer Overflow during syntax parsing because of a missing check for stack exhaustion with many '{' characters in jsparse.c." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/espruino/Espruino/commit/51380baf17241728b6d48cdb84140b931e3e3cc5", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/commit/51380baf17241728b6d48cdb84140b931e3e3cc5" + }, + { + "name" : "https://github.com/espruino/Espruino/issues/1448", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/issues/1448" + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11598.json b/2018/11xxx/CVE-2018-11598.json new file mode 100644 index 00000000000..ff31e59e022 --- /dev/null +++ b/2018/11xxx/CVE-2018-11598.json @@ -0,0 +1,82 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11598", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Espruino before 1.99 allows attackers to cause a denial of service (application crash) and a potential Information Disclosure with user crafted input files via a Buffer Overflow or Out-of-bounds Read during syntax parsing of certain for loops in jsparse.c." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/espruino/Espruino/commit/bf4416ab9129ee3afd56739ea4e3cd0da5484b6b", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/commit/bf4416ab9129ee3afd56739ea4e3cd0da5484b6b" + }, + { + "name" : "https://github.com/espruino/Espruino/files/2025956/test_0.txt", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/files/2025956/test_0.txt" + }, + { + "name" : "https://github.com/espruino/Espruino/files/2025963/test_1.txt", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/files/2025963/test_1.txt" + }, + { + "name" : "https://github.com/espruino/Espruino/files/2025968/test_2.txt", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/files/2025968/test_2.txt" + }, + { + "name" : "https://github.com/espruino/Espruino/issues/1437", + "refsource" : "MISC", + "url" : "https://github.com/espruino/Espruino/issues/1437" + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11599.json b/2018/11xxx/CVE-2018-11599.json new file mode 100644 index 00000000000..d9f67abe1a9 --- /dev/null +++ b/2018/11xxx/CVE-2018-11599.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11599", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11600.json b/2018/11xxx/CVE-2018-11600.json new file mode 100644 index 00000000000..c8634170610 --- /dev/null +++ b/2018/11xxx/CVE-2018-11600.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11600", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11601.json b/2018/11xxx/CVE-2018-11601.json new file mode 100644 index 00000000000..130379f4e49 --- /dev/null +++ b/2018/11xxx/CVE-2018-11601.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11601", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11602.json b/2018/11xxx/CVE-2018-11602.json new file mode 100644 index 00000000000..df64564267d --- /dev/null +++ b/2018/11xxx/CVE-2018-11602.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11602", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11603.json b/2018/11xxx/CVE-2018-11603.json new file mode 100644 index 00000000000..929292f6c07 --- /dev/null +++ b/2018/11xxx/CVE-2018-11603.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11603", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11604.json b/2018/11xxx/CVE-2018-11604.json new file mode 100644 index 00000000000..d0b82d59a3e --- /dev/null +++ b/2018/11xxx/CVE-2018-11604.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11604", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11605.json b/2018/11xxx/CVE-2018-11605.json new file mode 100644 index 00000000000..1e490318557 --- /dev/null +++ b/2018/11xxx/CVE-2018-11605.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11605", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11606.json b/2018/11xxx/CVE-2018-11606.json new file mode 100644 index 00000000000..fa9ff9aa51c --- /dev/null +++ b/2018/11xxx/CVE-2018-11606.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11606", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11607.json b/2018/11xxx/CVE-2018-11607.json new file mode 100644 index 00000000000..f713db4854a --- /dev/null +++ b/2018/11xxx/CVE-2018-11607.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11607", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11608.json b/2018/11xxx/CVE-2018-11608.json new file mode 100644 index 00000000000..669ef8feaa7 --- /dev/null +++ b/2018/11xxx/CVE-2018-11608.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11608", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11609.json b/2018/11xxx/CVE-2018-11609.json new file mode 100644 index 00000000000..3268897fd1c --- /dev/null +++ b/2018/11xxx/CVE-2018-11609.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11609", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11610.json b/2018/11xxx/CVE-2018-11610.json new file mode 100644 index 00000000000..91ee6643598 --- /dev/null +++ b/2018/11xxx/CVE-2018-11610.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11610", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11611.json b/2018/11xxx/CVE-2018-11611.json new file mode 100644 index 00000000000..23b41e4b716 --- /dev/null +++ b/2018/11xxx/CVE-2018-11611.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11611", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11612.json b/2018/11xxx/CVE-2018-11612.json new file mode 100644 index 00000000000..a693b84d625 --- /dev/null +++ b/2018/11xxx/CVE-2018-11612.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11612", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11613.json b/2018/11xxx/CVE-2018-11613.json new file mode 100644 index 00000000000..e5dc951c37f --- /dev/null +++ b/2018/11xxx/CVE-2018-11613.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11613", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11614.json b/2018/11xxx/CVE-2018-11614.json new file mode 100644 index 00000000000..5f5487c90e6 --- /dev/null +++ b/2018/11xxx/CVE-2018-11614.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11614", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11615.json b/2018/11xxx/CVE-2018-11615.json new file mode 100644 index 00000000000..6a0bc5e6489 --- /dev/null +++ b/2018/11xxx/CVE-2018-11615.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11615", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11616.json b/2018/11xxx/CVE-2018-11616.json new file mode 100644 index 00000000000..159d78b8580 --- /dev/null +++ b/2018/11xxx/CVE-2018-11616.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11616", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11617.json b/2018/11xxx/CVE-2018-11617.json new file mode 100644 index 00000000000..45e0b5d316d --- /dev/null +++ b/2018/11xxx/CVE-2018-11617.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11617", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11618.json b/2018/11xxx/CVE-2018-11618.json new file mode 100644 index 00000000000..d275ae93509 --- /dev/null +++ b/2018/11xxx/CVE-2018-11618.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11618", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11619.json b/2018/11xxx/CVE-2018-11619.json new file mode 100644 index 00000000000..52b7d4515e8 --- /dev/null +++ b/2018/11xxx/CVE-2018-11619.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11619", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11620.json b/2018/11xxx/CVE-2018-11620.json new file mode 100644 index 00000000000..03a852d9bc3 --- /dev/null +++ b/2018/11xxx/CVE-2018-11620.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11620", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11621.json b/2018/11xxx/CVE-2018-11621.json new file mode 100644 index 00000000000..eeece753045 --- /dev/null +++ b/2018/11xxx/CVE-2018-11621.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11621", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11622.json b/2018/11xxx/CVE-2018-11622.json new file mode 100644 index 00000000000..bd74e18e333 --- /dev/null +++ b/2018/11xxx/CVE-2018-11622.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11622", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11623.json b/2018/11xxx/CVE-2018-11623.json new file mode 100644 index 00000000000..c5d28186bdb --- /dev/null +++ b/2018/11xxx/CVE-2018-11623.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11623", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11624.json b/2018/11xxx/CVE-2018-11624.json new file mode 100644 index 00000000000..b0be1b8a0bb --- /dev/null +++ b/2018/11xxx/CVE-2018-11624.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11624", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "In ImageMagick 7.0.7-36 Q16, the ReadMATImage function in coders/mat.c allows attackers to cause a use after free via a crafted file." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/ImageMagick/ImageMagick/issues/1149", + "refsource" : "MISC", + "url" : "https://github.com/ImageMagick/ImageMagick/issues/1149" + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11625.json b/2018/11xxx/CVE-2018-11625.json new file mode 100644 index 00000000000..060e950cb2a --- /dev/null +++ b/2018/11xxx/CVE-2018-11625.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11625", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "In ImageMagick 7.0.7-37 Q16, SetGrayscaleImage in the quantize.c file allows attackers to cause a heap-based buffer over-read via a crafted file." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/ImageMagick/ImageMagick/issues/1156", + "refsource" : "MISC", + "url" : "https://github.com/ImageMagick/ImageMagick/issues/1156" + } + ] + } +}