diff --git a/2018/6xxx/CVE-2018-6337.json b/2018/6xxx/CVE-2018-6337.json index fca4b116738..ec4231c6d35 100644 --- a/2018/6xxx/CVE-2018-6337.json +++ b/2018/6xxx/CVE-2018-6337.json @@ -1,108 +1,108 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve-assign@fb.com", - "DATE_ASSIGNED": "2018-05-24", - "ID": "CVE-2018-6337", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "HHVM", - "version": { - "version_data": [ - { - "version_affected": "!=>", - "version_value": "3.26.3" - }, - { - "version_affected": ">=", - "version_value": "3.26.0" - }, - { - "version_affected": "!<", - "version_value": "3.26.0" - } - ] - } - } - ] - }, - "vendor_name": "Facebook" - }, - { - "product": { - "product_data": [ - { - "product_name": "folly", - "version": { - "version_data": [ - { - "version_affected": "!=>", - "version_value": "v2018.08.09.00" - }, - { - "version_affected": ">=", - "version_value": "v2017.12.11.00" - }, - { - "version_affected": "!<", - "version_value": "v2017.12.11.00" - } - ] - } - } - ] - }, - "vendor_name": "Facebook" - } + "CVE_data_meta" : { + "ASSIGNER" : "cve-assign@fb.com", + "DATE_ASSIGNED" : "2018-05-24", + "ID" : "CVE-2018-6337", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "HHVM", + "version" : { + "version_data" : [ + { + "version_affected" : "!=>", + "version_value" : "3.26.3" + }, + { + "version_affected" : ">=", + "version_value" : "3.26.0" + }, + { + "version_affected" : "!<", + "version_value" : "3.26.0" + } + ] + } + } + ] + }, + "vendor_name" : "Facebook" + }, + { + "product" : { + "product_data" : [ + { + "product_name" : "folly", + "version" : { + "version_data" : [ + { + "version_affected" : "!=>", + "version_value" : "v2018.08.09.00" + }, + { + "version_affected" : ">=", + "version_value" : "v2017.12.11.00" + }, + { + "version_affected" : "!<", + "version_value" : "v2017.12.11.00" + } + ] + } + } + ] + }, + "vendor_name" : "Facebook" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "folly::secureRandom will re-use a buffer between parent and child processes when fork() is called. That will result in multiple forked children producing repeat (or similar) results. This affects HHVM 3.26 prior to 3.26.3 and the folly library between v2017.12.11.00 and v2018.08.09.00." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Improper Cross-boundary Removal of Sensitive Data (CWE-212)" + } ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "folly::secureRandom will re-use a buffer between parent and child processes when fork() is called. That will result in multiple forked children producing repeat (or similar) results. This affects HHVM 3.26 prior to 3.26.3 and the folly library between v2017.12.11.00 and v2018.08.09.00." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Improper Cross-boundary Removal of Sensitive Data (CWE-212)" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://github.com/facebook/hhvm/commit/e2d10a1e32d01f71aaadd81169bcb9ae86c5d6b8", - "refsource": "MISC", - "url": "https://github.com/facebook/hhvm/commit/e2d10a1e32d01f71aaadd81169bcb9ae86c5d6b8" - }, - { - "name": "https://hhvm.com/blog/2018/05/24/hhvm-3.26.3.html", - "refsource": "MISC", - "url": "https://hhvm.com/blog/2018/05/24/hhvm-3.26.3.html" - }, - { - "name": "https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f", - "refsource": "MISC", - "url": "https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f" - } - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f", + "refsource" : "MISC", + "url" : "https://github.com/facebook/folly/commit/8e927ee48b114c8a2f90d0cbd5ac753795a6761f" + }, + { + "name" : "https://github.com/facebook/hhvm/commit/e2d10a1e32d01f71aaadd81169bcb9ae86c5d6b8", + "refsource" : "MISC", + "url" : "https://github.com/facebook/hhvm/commit/e2d10a1e32d01f71aaadd81169bcb9ae86c5d6b8" + }, + { + "name" : "https://hhvm.com/blog/2018/05/24/hhvm-3.26.3.html", + "refsource" : "MISC", + "url" : "https://hhvm.com/blog/2018/05/24/hhvm-3.26.3.html" + } + ] + } } diff --git a/2018/6xxx/CVE-2018-6340.json b/2018/6xxx/CVE-2018-6340.json index 160eed3d02b..436c4939685 100644 --- a/2018/6xxx/CVE-2018-6340.json +++ b/2018/6xxx/CVE-2018-6340.json @@ -1,81 +1,81 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve-assign@fb.com", - "DATE_ASSIGNED": "2018-12-18", - "ID": "CVE-2018-6340", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "HHVM", - "version": { - "version_data": [ - { - "version_affected": "!=>", - "version_value": "3.30.1" - }, - { - "version_affected": ">=", - "version_value": "3.30.0" - }, - { - "version_affected": "!=>", - "version_value": "3.27.5" - }, - { - "version_affected": "<", - "version_value": "3.27.5" - } - ] - } - } - ] - }, - "vendor_name": "Facebook" - } + "CVE_data_meta" : { + "ASSIGNER" : "cve-assign@fb.com", + "DATE_ASSIGNED" : "2018-12-18", + "ID" : "CVE-2018-6340", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "HHVM", + "version" : { + "version_data" : [ + { + "version_affected" : "!=>", + "version_value" : "3.30.1" + }, + { + "version_affected" : ">=", + "version_value" : "3.30.0" + }, + { + "version_affected" : "!=>", + "version_value" : "3.27.5" + }, + { + "version_affected" : "<", + "version_value" : "3.27.5" + } + ] + } + } + ] + }, + "vendor_name" : "Facebook" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "The Memcache::getextendedstats function can be used to trigger an out-of-bounds read. Exploiting this issue requires control over memcached server hostnames and/or ports. This affects all supported versions of HHVM (3.30 and 3.27.4 and below)." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Out-of-bounds Read (CWE-125)" + } ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "The Memcache::getextendedstats function can be used to trigger an out-of-bounds read. Exploiting this issue requires control over memcached server hostnames and/or ports. This affects all supported versions of HHVM (3.30 and 3.27.4 and below)." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Out-of-bounds Read (CWE-125)" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3", - "refsource": "MISC", - "url": "https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3" - }, - { - "name": "https://hhvm.com/blog/2018/12/18/hhvm-3.30.1.html", - "refsource": "MISC", - "url": "https://hhvm.com/blog/2018/12/18/hhvm-3.30.1.html" - } - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3", + "refsource" : "MISC", + "url" : "https://github.com/facebook/hhvm/commit/4bff3bfbe90d10451e4638c2118d1ad1117bb3e3" + }, + { + "name" : "https://hhvm.com/blog/2018/12/18/hhvm-3.30.1.html", + "refsource" : "MISC", + "url" : "https://hhvm.com/blog/2018/12/18/hhvm-3.30.1.html" + } + ] + } } diff --git a/2018/6xxx/CVE-2018-6341.json b/2018/6xxx/CVE-2018-6341.json index b8fd650e3d2..86b0ad976dc 100644 --- a/2018/6xxx/CVE-2018-6341.json +++ b/2018/6xxx/CVE-2018-6341.json @@ -1,109 +1,109 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve-assign@fb.com", - "DATE_ASSIGNED": "2018-08-01", - "ID": "CVE-2018-6341", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "react-dom", - "version": { - "version_data": [ - { - "version_affected": "!=>", - "version_value": "16.4.2" - }, - { - "version_affected": ">=", - "version_value": "16.4.0" - }, - { - "version_affected": "!=>", - "version_value": "16.3.3" - }, - { - "version_affected": ">=", - "version_value": "16.3.0" - }, - { - "version_affected": "!=>", - "version_value": "16.2.1" - }, - { - "version_affected": ">=", - "version_value": "16.2.0" - }, - { - "version_affected": "!=>", - "version_value": "16.1.2" - }, - { - "version_affected": ">=", - "version_value": "16.1.0" - }, - { - "version_affected": "!=>", - "version_value": "16.0.1" - }, - { - "version_affected": ">=", - "version_value": "16.0.0" - }, - { - "version_affected": "!<", - "version_value": "16.0.0" - } - ] - } - } - ] - }, - "vendor_name": "Facebook" - } + "CVE_data_meta" : { + "ASSIGNER" : "cve-assign@fb.com", + "DATE_ASSIGNED" : "2018-08-01", + "ID" : "CVE-2018-6341", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "react-dom", + "version" : { + "version_data" : [ + { + "version_affected" : "!=>", + "version_value" : "16.4.2" + }, + { + "version_affected" : ">=", + "version_value" : "16.4.0" + }, + { + "version_affected" : "!=>", + "version_value" : "16.3.3" + }, + { + "version_affected" : ">=", + "version_value" : "16.3.0" + }, + { + "version_affected" : "!=>", + "version_value" : "16.2.1" + }, + { + "version_affected" : ">=", + "version_value" : "16.2.0" + }, + { + "version_affected" : "!=>", + "version_value" : "16.1.2" + }, + { + "version_affected" : ">=", + "version_value" : "16.1.0" + }, + { + "version_affected" : "!=>", + "version_value" : "16.0.1" + }, + { + "version_affected" : ">=", + "version_value" : "16.0.0" + }, + { + "version_affected" : "!<", + "version_value" : "16.0.0" + } + ] + } + } + ] + }, + "vendor_name" : "Facebook" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "React applications which rendered to HTML using the ReactDOMServer API were not escaping user-supplied attribute names at render-time. That lack of escaping could lead to a cross-site scripting vulnerability. This issue affected minor releases 16.0.x, 16.1.x, 16.2.x, 16.3.x, and 16.4.x. It was fixed in 16.0.1, 16.1.2, 16.2.1, 16.3.3, and 16.4.2." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Improper Neutralization of Input During Web Page Generation (CWE-79)" + } ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "React applications which rendered to HTML using the ReactDOMServer API were not escaping user-supplied attribute names at render-time. That lack of escaping could lead to a cross-site scripting vulnerability. This issue affected minor releases 16.0.x, 16.1.x, 16.2.x, 16.3.x, and 16.4.x. It was fixed in 16.0.1, 16.1.2, 16.2.1, 16.3.3, and 16.4.2." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Improper Neutralization of Input During Web Page Generation (CWE-79)" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html", - "refsource": "MISC", - "url": "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" - }, - { - "name": "https://twitter.com/reactjs/status/1024745321987887104", - "refsource": "MISC", - "url": "https://twitter.com/reactjs/status/1024745321987887104" - } - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html", + "refsource" : "MISC", + "url" : "https://reactjs.org/blog/2018/08/01/react-v-16-4-2.html" + }, + { + "name" : "https://twitter.com/reactjs/status/1024745321987887104", + "refsource" : "MISC", + "url" : "https://twitter.com/reactjs/status/1024745321987887104" + } + ] + } } diff --git a/2018/6xxx/CVE-2018-6342.json b/2018/6xxx/CVE-2018-6342.json index ad5cdeaf4e7..e97b1f27131 100644 --- a/2018/6xxx/CVE-2018-6342.json +++ b/2018/6xxx/CVE-2018-6342.json @@ -1,109 +1,109 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve-assign@fb.com", - "DATE_ASSIGNED": "2018-08-24", - "ID": "CVE-2018-6342", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "react-dev-utils", - "version": { - "version_data": [ - { - "version_affected": "!=>", - "version_value": "5.0.2" - }, - { - "version_affected": ">=", - "version_value": "5.0.0" - }, - { - "version_affected": "!=>", - "version_value": "4.2.2" - }, - { - "version_affected": ">=", - "version_value": "4.0.0" - }, - { - "version_affected": "!=>", - "version_value": "3.1.2" - }, - { - "version_affected": ">=", - "version_value": "3.0.0" - }, - { - "version_affected": "!=>", - "version_value": "2.0.2" - }, - { - "version_affected": ">=", - "version_value": "2.0.0" - }, - { - "version_affected": "!=>", - "version_value": "1.0.4" - }, - { - "version_affected": ">=", - "version_value": "1.0.0" - }, - { - "version_affected": "!<", - "version_value": "1.0.0" - } - ] - } - } - ] - }, - "vendor_name": "Facebook" - } + "CVE_data_meta" : { + "ASSIGNER" : "cve-assign@fb.com", + "DATE_ASSIGNED" : "2018-08-24", + "ID" : "CVE-2018-6342", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "react-dev-utils", + "version" : { + "version_data" : [ + { + "version_affected" : "!=>", + "version_value" : "5.0.2" + }, + { + "version_affected" : ">=", + "version_value" : "5.0.0" + }, + { + "version_affected" : "!=>", + "version_value" : "4.2.2" + }, + { + "version_affected" : ">=", + "version_value" : "4.0.0" + }, + { + "version_affected" : "!=>", + "version_value" : "3.1.2" + }, + { + "version_affected" : ">=", + "version_value" : "3.0.0" + }, + { + "version_affected" : "!=>", + "version_value" : "2.0.2" + }, + { + "version_affected" : ">=", + "version_value" : "2.0.0" + }, + { + "version_affected" : "!=>", + "version_value" : "1.0.4" + }, + { + "version_affected" : ">=", + "version_value" : "1.0.0" + }, + { + "version_affected" : "!<", + "version_value" : "1.0.0" + } + ] + } + } + ] + }, + "vendor_name" : "Facebook" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "react-dev-utils on Windows allows developers to run a local webserver for accepting various commands, including a command to launch an editor. The input to that command was not properly sanitized, allowing an attacker who can make a network request to the server (either via CSRF or by direct request) to execute arbitrary commands on the targeted system. This issue affects multiple branches: 1.x.x prior to 1.0.4, 2.x.x prior to 2.0.2, 3.x.x prior to 3.1.2, 4.x.x prior to 4.2.2, and 5.x.x prior to 5.0.2." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Improper Neutralization of Special Elements used in an OS Command (CWE-78)" + } ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "react-dev-utils on Windows allows developers to run a local webserver for accepting various commands, including a command to launch an editor. The input to that command was not properly sanitized, allowing an attacker who can make a network request to the server (either via CSRF or by direct request) to execute arbitrary commands on the targeted system. This issue affects multiple branches: 1.x.x prior to 1.0.4, 2.x.x prior to 2.0.2, 3.x.x prior to 3.1.2, 4.x.x prior to 4.2.2, and 5.x.x prior to 5.0.2." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Improper Neutralization of Special Elements used in an OS Command (CWE-78)" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://github.com/facebook/create-react-app/releases/tag/v1.1.5", - "refsource": "MISC", - "url": "https://github.com/facebook/create-react-app/releases/tag/v1.1.5" - }, - { - "name": "https://github.com/facebook/create-react-app/pull/4866", - "refsource": "MISC", - "url": "https://github.com/facebook/create-react-app/pull/4866" - } - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/facebook/create-react-app/pull/4866", + "refsource" : "MISC", + "url" : "https://github.com/facebook/create-react-app/pull/4866" + }, + { + "name" : "https://github.com/facebook/create-react-app/releases/tag/v1.1.5", + "refsource" : "MISC", + "url" : "https://github.com/facebook/create-react-app/releases/tag/v1.1.5" + } + ] + } } diff --git a/2018/6xxx/CVE-2018-6343.json b/2018/6xxx/CVE-2018-6343.json index 577a1b781a2..5fab7740251 100644 --- a/2018/6xxx/CVE-2018-6343.json +++ b/2018/6xxx/CVE-2018-6343.json @@ -1,72 +1,72 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve-assign@fb.com", - "DATE_ASSIGNED": "2018-11-21", - "ID": "CVE-2018-6343", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Proxygen", - "version": { - "version_data": [ - { - "version_affected": "!=>", - "version_value": "v2018.11.19.00" - }, - { - "version_affected": ">=", - "version_value": "v2018.10.29.00" - }, - { - "version_affected": "!<", - "version_value": "v2018.10.29.00" - } - ] - } - } - ] - }, - "vendor_name": "Facebook" - } + "CVE_data_meta" : { + "ASSIGNER" : "cve-assign@fb.com", + "DATE_ASSIGNED" : "2018-11-21", + "ID" : "CVE-2018-6343", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Proxygen", + "version" : { + "version_data" : [ + { + "version_affected" : "!=>", + "version_value" : "v2018.11.19.00" + }, + { + "version_affected" : ">=", + "version_value" : "v2018.10.29.00" + }, + { + "version_affected" : "!<", + "version_value" : "v2018.10.29.00" + } + ] + } + } + ] + }, + "vendor_name" : "Facebook" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Proxygen fails to validate that a secondary auth manager is set before dereferencing it. That can cause a denial of service issue when parsing a Certificate/CertificateRequest HTTP2 Frame over a fizz (TLS 1.3) transport. This issue affects Proxygen releases starting from v2018.10.29.00 until the fix in v2018.11.19.00." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "NULL Pointer Dereference (CWE-476)" + } ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Proyxgen fails to validate that a secondary auth manager is set before dereferencing it. That can cause a denial of service issue when parsing a Certificate/CertificateRequest HTTP2 Frame over a fizz (TLS 1.3) transport. This issue affects Proxygen releases starting from v2018.10.29.00 until the fix in v2018.11.19.00." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "NULL Pointer Dereference (CWE-476)" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://github.com/facebook/proxygen/commit/0600ebe59c3e82cd012def77ca9ca1918da74a71", - "refsource": "MISC", - "url": "https://github.com/facebook/proxygen/commit/0600ebe59c3e82cd012def77ca9ca1918da74a71" - } - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/facebook/proxygen/commit/0600ebe59c3e82cd012def77ca9ca1918da74a71", + "refsource" : "MISC", + "url" : "https://github.com/facebook/proxygen/commit/0600ebe59c3e82cd012def77ca9ca1918da74a71" + } + ] + } } diff --git a/2018/6xxx/CVE-2018-6344.json b/2018/6xxx/CVE-2018-6344.json index 4b7da65fbbd..a0a6b013c53 100644 --- a/2018/6xxx/CVE-2018-6344.json +++ b/2018/6xxx/CVE-2018-6344.json @@ -1,112 +1,112 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve-assign@fb.com", - "DATE_ASSIGNED": "2018-11-21", - "ID": "CVE-2018-6344", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "WhatsApp for Android", - "version": { - "version_data": [ - { - "version_affected": "!=>", - "version_value": "2.18.293" - }, - { - "version_affected": "<", - "version_value": "2.18.293" - } - ] - } - } - ] - }, - "vendor_name": "Facebook" - }, - { - "product": { - "product_data": [ - { - "product_name": "WhatsApp for iOS", - "version": { - "version_data": [ - { - "version_affected": "!=>", - "version_value": "2.18.93" - }, - { - "version_affected": "<", - "version_value": "2.18.93" - } - ] - } - } - ] - }, - "vendor_name": "Facebook" - }, - { - "product": { - "product_data": [ - { - "product_name": "WhatsApp for Windows Phone", - "version": { - "version_data": [ - { - "version_affected": "!=>", - "version_value": "2.18.172" - }, - { - "version_affected": "<", - "version_value": "2.18.172" - } - ] - } - } - ] - }, - "vendor_name": "Facebook" - } + "CVE_data_meta" : { + "ASSIGNER" : "cve-assign@fb.com", + "DATE_ASSIGNED" : "2018-11-21", + "ID" : "CVE-2018-6344", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "WhatsApp for Android", + "version" : { + "version_data" : [ + { + "version_affected" : "!=>", + "version_value" : "2.18.293" + }, + { + "version_affected" : "<", + "version_value" : "2.18.293" + } + ] + } + } + ] + }, + "vendor_name" : "Facebook" + }, + { + "product" : { + "product_data" : [ + { + "product_name" : "WhatsApp for iOS", + "version" : { + "version_data" : [ + { + "version_affected" : "!=>", + "version_value" : "2.18.93" + }, + { + "version_affected" : "<", + "version_value" : "2.18.93" + } + ] + } + } + ] + }, + "vendor_name" : "Facebook" + }, + { + "product" : { + "product_data" : [ + { + "product_name" : "WhatsApp for Windows Phone", + "version" : { + "version_data" : [ + { + "version_affected" : "!=>", + "version_value" : "2.18.172" + }, + { + "version_affected" : "<", + "version_value" : "2.18.172" + } + ] + } + } + ] + }, + "vendor_name" : "Facebook" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A heap corruption in WhatsApp can be caused by a malformed RTP packet being sent after a call is established. The vulnerability can be used to cause denial of service. It affects WhatsApp for Android prior to v2.18.293, WhatsApp for iOS prior to v2.18.93, and WhatsApp for Windows Phone prior to v2.18.172." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Heap-based Buffer Overflow (CWE-122)" + } ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A heap corruption in WhatsApp can be caused by a malformed RTP packet being sent after a call is established. The vulnerability can be used to cause denial of service. It affects WhatsApp for Android prior to v2.18.293, WhatsApp for iOS prior to v2.18.93, and WhatsApp for Windows Phone prior to v2.18.172." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Heap-based Buffer Overflow (CWE-122)" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-3.html", - "refsource": "MISC", - "url": "https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-3.html" - } - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-3.html", + "refsource" : "MISC", + "url" : "https://googleprojectzero.blogspot.com/2018/12/adventures-in-video-conferencing-part-3.html" + } + ] + } } diff --git a/2018/6xxx/CVE-2018-6346.json b/2018/6xxx/CVE-2018-6346.json index e3cdb33ab0d..cbc10e667b5 100644 --- a/2018/6xxx/CVE-2018-6346.json +++ b/2018/6xxx/CVE-2018-6346.json @@ -1,68 +1,68 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve-assign@fb.com", - "DATE_ASSIGNED": "2018-12-19", - "ID": "CVE-2018-6346", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Proxygen", - "version": { - "version_data": [ - { - "version_affected": "!=>", - "version_value": "v2018.12.31.00" - }, - { - "version_affected": "<=", - "version_value": "v2018.12.31.00" - } - ] - } - } - ] - }, - "vendor_name": "Facebook" - } + "CVE_data_meta" : { + "ASSIGNER" : "cve-assign@fb.com", + "DATE_ASSIGNED" : "2018-12-19", + "ID" : "CVE-2018-6346", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Proxygen", + "version" : { + "version_data" : [ + { + "version_affected" : "!=>", + "version_value" : "v2018.12.31.00" + }, + { + "version_affected" : "<=", + "version_value" : "v2018.12.31.00" + } + ] + } + } + ] + }, + "vendor_name" : "Facebook" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A potential denial-of-service issue in the Proxygen handling of invalid HTTP2 priority settings (specifically a circular dependency). This affects Proxygen prior to v2018.12.31.00." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Denial of Service (CWE-400)" + } ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A potential denial-of-service issue in the Proxygen handling of invalid HTTP2 priority settings (specifically a circular dependency). This affects Proxygen prior to v2018.12.31.00." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Denial of Service (CWE-400)" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://github.com/facebook/proxygen/commit/52cf331743ebd74194d6343a6c2ec52bb917c982", - "refsource": "MISC", - "url": "https://github.com/facebook/proxygen/commit/52cf331743ebd74194d6343a6c2ec52bb917c982" - } - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/facebook/proxygen/commit/52cf331743ebd74194d6343a6c2ec52bb917c982", + "refsource" : "MISC", + "url" : "https://github.com/facebook/proxygen/commit/52cf331743ebd74194d6343a6c2ec52bb917c982" + } + ] + } } diff --git a/2018/6xxx/CVE-2018-6347.json b/2018/6xxx/CVE-2018-6347.json index 82595f8e6ad..5ed6b636a66 100644 --- a/2018/6xxx/CVE-2018-6347.json +++ b/2018/6xxx/CVE-2018-6347.json @@ -1,68 +1,68 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve-assign@fb.com", - "DATE_ASSIGNED": "2018-12-19", - "ID": "CVE-2018-6347", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "Proxygen", - "version": { - "version_data": [ - { - "version_affected": "!=>", - "version_value": "v2018.12.31.00" - }, - { - "version_affected": "<=", - "version_value": "v2018.12.31.00" - } - ] - } - } - ] - }, - "vendor_name": "Facebook" - } + "CVE_data_meta" : { + "ASSIGNER" : "cve-assign@fb.com", + "DATE_ASSIGNED" : "2018-12-19", + "ID" : "CVE-2018-6347", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "Proxygen", + "version" : { + "version_data" : [ + { + "version_affected" : "!=>", + "version_value" : "v2018.12.31.00" + }, + { + "version_affected" : "<=", + "version_value" : "v2018.12.31.00" + } + ] + } + } + ] + }, + "vendor_name" : "Facebook" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue in the Proxygen handling of HTTP2 parsing of headers/trailers can lead to a denial-of-service attack. This affects Proxygen prior to v2018.12.31.00." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "Denial of Service (CWE-400)" + } ] - } - }, - "data_format": "MITRE", - "data_type": "CVE", - "data_version": "4.0", - "description": { - "description_data": [ - { - "lang": "eng", - "value": "An issue in the Proxygen handling of HTTP2 parsing of headers/trailers can lead to a denial-of-service attack. This affects Proxygen prior to v2018.12.31.00." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "Denial of Service (CWE-400)" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://github.com/facebook/proxygen/commit/223e0aa6bc7590e86af1e917185a2e0efe160711", - "refsource": "MISC", - "url": "https://github.com/facebook/proxygen/commit/223e0aa6bc7590e86af1e917185a2e0efe160711" - } - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/facebook/proxygen/commit/223e0aa6bc7590e86af1e917185a2e0efe160711", + "refsource" : "MISC", + "url" : "https://github.com/facebook/proxygen/commit/223e0aa6bc7590e86af1e917185a2e0efe160711" + } + ] + } }