From 7cdadf5a32690a07b0e5fa8142bd14ee60669dde Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 3 Jan 2019 18:08:24 -0500 Subject: [PATCH] - Synchronized data. --- 2018/20xxx/CVE-2018-20665.json | 18 ++++++++++ 2018/20xxx/CVE-2018-20666.json | 18 ++++++++++ 2018/20xxx/CVE-2018-20667.json | 18 ++++++++++ 2018/20xxx/CVE-2018-20668.json | 18 ++++++++++ 2018/3xxx/CVE-2018-3986.json | 2 ++ 2018/4xxx/CVE-2018-4012.json | 2 ++ 2018/8xxx/CVE-2018-8827.json | 48 ++++++++++++++++++++++++-- 2019/5xxx/CVE-2019-5005.json | 62 ++++++++++++++++++++++++++++++++++ 2019/5xxx/CVE-2019-5006.json | 62 ++++++++++++++++++++++++++++++++++ 2019/5xxx/CVE-2019-5007.json | 62 ++++++++++++++++++++++++++++++++++ 2019/5xxx/CVE-2019-5008.json | 18 ++++++++++ 11 files changed, 326 insertions(+), 2 deletions(-) create mode 100644 2018/20xxx/CVE-2018-20665.json create mode 100644 2018/20xxx/CVE-2018-20666.json create mode 100644 2018/20xxx/CVE-2018-20667.json create mode 100644 2018/20xxx/CVE-2018-20668.json create mode 100644 2019/5xxx/CVE-2019-5005.json create mode 100644 2019/5xxx/CVE-2019-5006.json create mode 100644 2019/5xxx/CVE-2019-5007.json create mode 100644 2019/5xxx/CVE-2019-5008.json diff --git a/2018/20xxx/CVE-2018-20665.json b/2018/20xxx/CVE-2018-20665.json new file mode 100644 index 00000000000..0b27aff0973 --- /dev/null +++ b/2018/20xxx/CVE-2018-20665.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20665", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20666.json b/2018/20xxx/CVE-2018-20666.json new file mode 100644 index 00000000000..0bf3a23bfe4 --- /dev/null +++ b/2018/20xxx/CVE-2018-20666.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20666", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20667.json b/2018/20xxx/CVE-2018-20667.json new file mode 100644 index 00000000000..9f81387d926 --- /dev/null +++ b/2018/20xxx/CVE-2018-20667.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20667", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20668.json b/2018/20xxx/CVE-2018-20668.json new file mode 100644 index 00000000000..8b2049cd38b --- /dev/null +++ b/2018/20xxx/CVE-2018-20668.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20668", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/3xxx/CVE-2018-3986.json b/2018/3xxx/CVE-2018-3986.json index e7248a14e8f..48cb33f6e57 100644 --- a/2018/3xxx/CVE-2018-3986.json +++ b/2018/3xxx/CVE-2018-3986.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0654", + "refsource" : "MISC", "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0654" } ] diff --git a/2018/4xxx/CVE-2018-4012.json b/2018/4xxx/CVE-2018-4012.json index 0df606a9ad2..d33a7968754 100644 --- a/2018/4xxx/CVE-2018-4012.json +++ b/2018/4xxx/CVE-2018-4012.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0683", + "refsource" : "MISC", "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2018-0683" } ] diff --git a/2018/8xxx/CVE-2018-8827.json b/2018/8xxx/CVE-2018-8827.json index d8ff0890712..2ef098316fc 100644 --- a/2018/8xxx/CVE-2018-8827.json +++ b/2018/8xxx/CVE-2018-8827.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-8827", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,28 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "The admin web interface on Technicolor MediaAccess TG789vac v2 HP devices with firmware v16.3.7190-2761005-20161004084353 displays unsanitised user input, which allows an unauthenticated malicious user to embed JavaScript into the Log viewer interface via a crafted HTTP Referer header, aka XSS." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "http://45.32.113.185/075a6fa2d5db3bf3457896bee6db6787.html", + "refsource" : "MISC", + "url" : "http://45.32.113.185/075a6fa2d5db3bf3457896bee6db6787.html" } ] } diff --git a/2019/5xxx/CVE-2019-5005.json b/2019/5xxx/CVE-2019-5005.json new file mode 100644 index 00000000000..ed2e01d850a --- /dev/null +++ b/2019/5xxx/CVE-2019-5005.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-5005", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in Foxit Reader and PhantomPDF before 9.4 on Windows. They allowed Denial of Service (application crash) via image data, because two bytes are written to the end of the allocated memory without judging whether this will cause corruption." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.foxitsoftware.com/support/security-bulletins.php", + "refsource" : "CONFIRM", + "url" : "https://www.foxitsoftware.com/support/security-bulletins.php" + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5006.json b/2019/5xxx/CVE-2019-5006.json new file mode 100644 index 00000000000..b1555764306 --- /dev/null +++ b/2019/5xxx/CVE-2019-5006.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-5006", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in Foxit Reader and PhantomPDF before 9.4 on Windows. It is a NULL pointer dereference during PDF parsing." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.foxitsoftware.com/support/security-bulletins.php", + "refsource" : "CONFIRM", + "url" : "https://www.foxitsoftware.com/support/security-bulletins.php" + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5007.json b/2019/5xxx/CVE-2019-5007.json new file mode 100644 index 00000000000..14cced1b6a4 --- /dev/null +++ b/2019/5xxx/CVE-2019-5007.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-5007", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in Foxit Reader and PhantomPDF before 9.4 on Windows. It is an Out-of-Bounds Read Information Disclosure and crash due to a NULL pointer dereference when reading TIFF data during TIFF parsing." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.foxitsoftware.com/support/security-bulletins.php", + "refsource" : "CONFIRM", + "url" : "https://www.foxitsoftware.com/support/security-bulletins.php" + } + ] + } +} diff --git a/2019/5xxx/CVE-2019-5008.json b/2019/5xxx/CVE-2019-5008.json new file mode 100644 index 00000000000..60857751e4d --- /dev/null +++ b/2019/5xxx/CVE-2019-5008.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-5008", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}