From 9473c21bef44d557ea5859528ff7d326e1c5a68d Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 28 Oct 2018 22:06:41 -0400 Subject: [PATCH] - Synchronized data. --- 2018/18xxx/CVE-2018-18771.json | 62 ++++++++++++++++++++++++++++++++++ 2018/18xxx/CVE-2018-18772.json | 18 ++++++++++ 2018/18xxx/CVE-2018-18773.json | 18 ++++++++++ 2018/18xxx/CVE-2018-18774.json | 18 ++++++++++ 2018/18xxx/CVE-2018-18775.json | 18 ++++++++++ 2018/18xxx/CVE-2018-18776.json | 18 ++++++++++ 2018/18xxx/CVE-2018-18777.json | 18 ++++++++++ 2018/18xxx/CVE-2018-18778.json | 62 ++++++++++++++++++++++++++++++++++ 8 files changed, 232 insertions(+) create mode 100644 2018/18xxx/CVE-2018-18771.json create mode 100644 2018/18xxx/CVE-2018-18772.json create mode 100644 2018/18xxx/CVE-2018-18773.json create mode 100644 2018/18xxx/CVE-2018-18774.json create mode 100644 2018/18xxx/CVE-2018-18775.json create mode 100644 2018/18xxx/CVE-2018-18776.json create mode 100644 2018/18xxx/CVE-2018-18777.json create mode 100644 2018/18xxx/CVE-2018-18778.json diff --git a/2018/18xxx/CVE-2018-18771.json b/2018/18xxx/CVE-2018-18771.json new file mode 100644 index 00000000000..99aae3eebea --- /dev/null +++ b/2018/18xxx/CVE-2018-18771.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18771", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in LuLu CMS through 2015-05-14. backend\\modules\\filemanager\\controllers\\DefaultController.php allows arbitrary file upload by entering a filename, directory name, and PHP code into the three text input fields." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/yiifans/lulucms/issues/6", + "refsource" : "MISC", + "url" : "https://github.com/yiifans/lulucms/issues/6" + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18772.json b/2018/18xxx/CVE-2018-18772.json new file mode 100644 index 00000000000..8868b670200 --- /dev/null +++ b/2018/18xxx/CVE-2018-18772.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18772", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18773.json b/2018/18xxx/CVE-2018-18773.json new file mode 100644 index 00000000000..eb0c7edb230 --- /dev/null +++ b/2018/18xxx/CVE-2018-18773.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18773", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18774.json b/2018/18xxx/CVE-2018-18774.json new file mode 100644 index 00000000000..8e4aef19c1f --- /dev/null +++ b/2018/18xxx/CVE-2018-18774.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18774", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18775.json b/2018/18xxx/CVE-2018-18775.json new file mode 100644 index 00000000000..d6bad6d1a3c --- /dev/null +++ b/2018/18xxx/CVE-2018-18775.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18775", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18776.json b/2018/18xxx/CVE-2018-18776.json new file mode 100644 index 00000000000..731f005ef14 --- /dev/null +++ b/2018/18xxx/CVE-2018-18776.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18776", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18777.json b/2018/18xxx/CVE-2018-18777.json new file mode 100644 index 00000000000..cc9da71f49a --- /dev/null +++ b/2018/18xxx/CVE-2018-18777.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18777", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/18xxx/CVE-2018-18778.json b/2018/18xxx/CVE-2018-18778.json new file mode 100644 index 00000000000..2578d06962c --- /dev/null +++ b/2018/18xxx/CVE-2018-18778.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-18778", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "ACME mini_httpd before 1.30 lets remote users read arbitrary files." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "http://www.acme.com/software/mini_httpd/", + "refsource" : "MISC", + "url" : "http://www.acme.com/software/mini_httpd/" + } + ] + } +}