diff --git a/2016/9xxx/CVE-2016-9577.json b/2016/9xxx/CVE-2016-9577.json index 44ecf141433..184d0ca4f0f 100644 --- a/2016/9xxx/CVE-2016-9577.json +++ b/2016/9xxx/CVE-2016-9577.json @@ -1,85 +1,86 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2016-9577", - "ASSIGNER": "anemec@redhat.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Red Hat", - "product": { - "product_data": [ - { - "product_name": "spice", - "version": { - "version_data": [ - { - "version_value": "0.13.90" - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "anemec@redhat.com", + "ID" : "CVE-2016-9577", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "spice", + "version" : { + "version_data" : [ + { + "version_value" : "0.13.90" + } + ] + } + } + ] + }, + "vendor_name" : "Red Hat" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An authenticated attacker could send crafted messages to the SPICE server causing a heap overflow leading to a crash or possible code execution." + } + ] + }, + "impact" : { + "cvss" : [ + [ + { + "vectorString" : "7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version" : "3.0" + } + ], + [ + { + "vectorString" : "6.0/AV:N/AC:M/Au:S/C:P/I:P/A:P", + "version" : "2.0" + } + ] + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-20" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-20" - } - ] - }, - { - "description": [ - { - "lang": "eng", - "value": "CWE-122" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9577", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9577", - "refsource": "CONFIRM" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An authenticated attacker could send crafted messages to the SPICE server causing a heap overflow leading to a crash or possible code execution." - } - ] - }, - "impact": { - "cvss": [ - [ - { - "vectorString": "7.5/CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", - "version": "3.0" - } - ], - [ - { - "vectorString": "6.0/AV:N/AC:M/Au:S/C:P/I:P/A:P", - "version": "2.0" - } + }, + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-122" + } ] - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9577", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9577" + } + ] + } } diff --git a/2017/15xxx/CVE-2017-15097.json b/2017/15xxx/CVE-2017-15097.json index 2417c3af0a8..d330864a2c4 100644 --- a/2017/15xxx/CVE-2017-15097.json +++ b/2017/15xxx/CVE-2017-15097.json @@ -1,71 +1,72 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2017-15097", - "ASSIGNER": "anemec@redhat.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Red Hat", - "product": { - "product_data": [ - { - "product_name": "postgresql init script", - "version": { - "version_data": [ - { - "version_value": "all" - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "anemec@redhat.com", + "ID" : "CVE-2017-15097", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "postgresql init script", + "version" : { + "version_data" : [ + { + "version_value" : "all" + } + ] + } + } + ] + }, + "vendor_name" : "Red Hat" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Privilege escalation flaws were found in the Red Hat initialization scripts of PostgreSQL. An attacker with access to the postgres user account could use these flaws to obtain root access on the server machine." + } + ] + }, + "impact" : { + "cvss" : [ + [ + { + "vectorString" : "6.5/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", + "version" : "3.0" + } + ] + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-59" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-59" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15097", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15097", - "refsource": "CONFIRM" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "Privilege escalation flaws were found in the Red Hat initialization scripts of PostgreSQL. An attacker with access to the postgres user account could use these flaws to obtain root access on the server machine." - } - ] - }, - "impact": { - "cvss": [ - [ - { - "vectorString": "6.5/CVSS:3.0/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", - "version": "3.0" - } - ] - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15097", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15097" + } + ] + } } diff --git a/2017/15xxx/CVE-2017-15101.json b/2017/15xxx/CVE-2017-15101.json index 1e87f7d3d9e..c9070e6506b 100644 --- a/2017/15xxx/CVE-2017-15101.json +++ b/2017/15xxx/CVE-2017-15101.json @@ -1,71 +1,72 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2017-15101", - "ASSIGNER": "anemec@redhat.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Liblouis", - "product": { - "product_data": [ - { - "product_name": "liblouis", - "version": { - "version_data": [ - { - "version_value": "2.5.4" - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "anemec@redhat.com", + "ID" : "CVE-2017-15101", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "liblouis", + "version" : { + "version_data" : [ + { + "version_value" : "2.5.4" + } + ] + } + } + ] + }, + "vendor_name" : "Liblouis" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "A missing patch for a stack-based buffer overflow in findTable() was found in Red Hat version of liblouis before 2.5.4. An attacker could cause a denial of service condition or potentially even arbitrary code execution." + } + ] + }, + "impact" : { + "cvss" : [ + [ + { + "vectorString" : "7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", + "version" : "3.0" + } + ] + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-121" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-121" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15101", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15101", - "refsource": "CONFIRM" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "A missing patch for a stack-based buffer overflow in findTable() was found in Red Hat version of liblouis before 2.5.4. An attacker could cause a denial of service condition or potentially even arbitrary code execution." - } - ] - }, - "impact": { - "cvss": [ - [ - { - "vectorString": "7.8/CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", - "version": "3.0" - } - ] - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15101", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-15101" + } + ] + } } diff --git a/2017/2xxx/CVE-2017-2648.json b/2017/2xxx/CVE-2017-2648.json index 2a7bf333469..b03e4b88b04 100644 --- a/2017/2xxx/CVE-2017-2648.json +++ b/2017/2xxx/CVE-2017-2648.json @@ -1,74 +1,77 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2017-2648", - "ASSIGNER": "anemec@redhat.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Jenkins", - "product": { - "product_data": [ - { - "product_name": "jenkins-ssh-slaves-plugin", - "version": { - "version_data": [ - { - "version_value": "1.15" - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "anemec@redhat.com", + "ID" : "CVE-2017-2648", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "jenkins-ssh-slaves-plugin", + "version" : { + "version_data" : [ + { + "version_value" : "1.15" + } + ] + } + } + ] + }, + "vendor_name" : "Jenkins" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "It was found that jenkins-ssh-slaves-plugin before version 1.15 did not perform host key verification, thereby enabling Man-in-the-Middle attacks." + } + ] + }, + "impact" : { + "cvss" : [ + [ + { + "vectorString" : "6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", + "version" : "3.0" + } + ] + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-295" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-295" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://jenkins.io/security/advisory/2017-03-20/" - }, - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2648", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2648", - "refsource": "CONFIRM" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "It was found that jenkins-ssh-slaves-plugin before version 1.15 did not perform host key verification, thereby enabling Man-in-the-Middle attacks. " - } - ] - }, - "impact": { - "cvss": [ - [ - { - "vectorString": "6.8/CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:N", - "version": "3.0" - } - ] - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2648", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2648" + }, + { + "name" : "https://jenkins.io/security/advisory/2017-03-20/", + "refsource" : "CONFIRM", + "url" : "https://jenkins.io/security/advisory/2017-03-20/" + } + ] + } } diff --git a/2017/2xxx/CVE-2017-2649.json b/2017/2xxx/CVE-2017-2649.json index dd3a6346750..d88c0faac5e 100644 --- a/2017/2xxx/CVE-2017-2649.json +++ b/2017/2xxx/CVE-2017-2649.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://jenkins.io/security/advisory/2017-03-20/", + "refsource" : "CONFIRM", "url" : "https://jenkins.io/security/advisory/2017-03-20/" } ] diff --git a/2017/2xxx/CVE-2017-2650.json b/2017/2xxx/CVE-2017-2650.json index 4e2247e7dd3..20ff1849b22 100644 --- a/2017/2xxx/CVE-2017-2650.json +++ b/2017/2xxx/CVE-2017-2650.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://jenkins.io/security/advisory/2017-03-20/", + "refsource" : "CONFIRM", "url" : "https://jenkins.io/security/advisory/2017-03-20/" } ] diff --git a/2017/2xxx/CVE-2017-2652.json b/2017/2xxx/CVE-2017-2652.json index dba5121d993..1924440a2b1 100644 --- a/2017/2xxx/CVE-2017-2652.json +++ b/2017/2xxx/CVE-2017-2652.json @@ -35,7 +35,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "It was found that there were no permission checks performed in the Distributed Fork plugin before and including 1.5.0 that provides the dist-fork CLI command beyond the basic check for Overall/Read permission, allowing anyone with that permission to run arbitrary shell commands on all connected nodes." + "value" : "It was found that there were no permission checks performed in the Distributed Fork plugin before and including 1.5.0 for Jenkins that provides the dist-fork CLI command beyond the basic check for Overall/Read permission, allowing anyone with that permission to run arbitrary shell commands on all connected nodes." } ] }, @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://jenkins.io/security/advisory/2017-03-20/", + "refsource" : "CONFIRM", "url" : "https://jenkins.io/security/advisory/2017-03-20/" } ] diff --git a/2017/2xxx/CVE-2017-2663.json b/2017/2xxx/CVE-2017-2663.json index a332418a9e0..f7b492f32a9 100644 --- a/2017/2xxx/CVE-2017-2663.json +++ b/2017/2xxx/CVE-2017-2663.json @@ -1,71 +1,77 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", - "CVE_data_meta": { - "ID": "CVE-2017-2663", - "ASSIGNER": "anemec@redhat.com" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "vendor_name": "Red Hat", - "product": { - "product_data": [ - { - "product_name": "subscription-manager", - "version": { - "version_data": [ - { - "version_value": "1.19.4" - } - ] - } - } - ] - } - } + "CVE_data_meta" : { + "ASSIGNER" : "anemec@redhat.com", + "ID" : "CVE-2017-2663", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "subscription-manager", + "version" : { + "version_data" : [ + { + "version_value" : "1.19.4" + } + ] + } + } + ] + }, + "vendor_name" : "Red Hat" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "It was found that subscription-manager's DBus interface before 1.19.4 let unprivileged user access the com.redhat.RHSM1.Facts.GetFacts and com.redhat.RHSM1.Config.Set methods. An unprivileged local attacker could use these methods to gain access to private information, or launch a privilege escalation attack." + } + ] + }, + "impact" : { + "cvss" : [ + [ + { + "vectorString" : "8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", + "version" : "3.0" + } + ] + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "CWE-270" + } ] - } - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "CWE-270" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "url": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2663", - "name": "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2663", - "refsource": "CONFIRM" - } - ] - }, - "description": { - "description_data": [ - { - "lang": "eng", - "value": "It was found that subscription-manager's DBus interface before 1.19.4 let unprivileged user access the com.redhat.RHSM1.Facts.GetFacts and com.redhat.RHSM1.Config.Set methods. An unprivileged local attacker could use these methods to gain access to private information, or launch a privilege escalation attack." - } - ] - }, - "impact": { - "cvss": [ - [ - { - "vectorString": "8.2/CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H", - "version": "3.0" - } - ] - ] - } + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2663", + "refsource" : "CONFIRM", + "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2663" + }, + { + "name" : "https://github.com/candlepin/subscription-manager/commit/2aa48ef65", + "refsource" : "CONFIRM", + "url" : "https://github.com/candlepin/subscription-manager/commit/2aa48ef65" + } + ] + } } diff --git a/2018/14xxx/CVE-2018-14668.json b/2018/14xxx/CVE-2018-14668.json new file mode 100644 index 00000000000..027ee0dbd9d --- /dev/null +++ b/2018/14xxx/CVE-2018-14668.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-14668", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/14xxx/CVE-2018-14669.json b/2018/14xxx/CVE-2018-14669.json new file mode 100644 index 00000000000..5bc8cfc674d --- /dev/null +++ b/2018/14xxx/CVE-2018-14669.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-14669", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/14xxx/CVE-2018-14670.json b/2018/14xxx/CVE-2018-14670.json new file mode 100644 index 00000000000..c072e411ec5 --- /dev/null +++ b/2018/14xxx/CVE-2018-14670.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-14670", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/14xxx/CVE-2018-14671.json b/2018/14xxx/CVE-2018-14671.json new file mode 100644 index 00000000000..f0d71c3d25b --- /dev/null +++ b/2018/14xxx/CVE-2018-14671.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-14671", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/14xxx/CVE-2018-14672.json b/2018/14xxx/CVE-2018-14672.json new file mode 100644 index 00000000000..175262abb5b --- /dev/null +++ b/2018/14xxx/CVE-2018-14672.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-14672", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/14xxx/CVE-2018-14673.json b/2018/14xxx/CVE-2018-14673.json new file mode 100644 index 00000000000..3a9f888a608 --- /dev/null +++ b/2018/14xxx/CVE-2018-14673.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-14673", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/14xxx/CVE-2018-14674.json b/2018/14xxx/CVE-2018-14674.json new file mode 100644 index 00000000000..d51cd61d1c1 --- /dev/null +++ b/2018/14xxx/CVE-2018-14674.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-14674", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/14xxx/CVE-2018-14675.json b/2018/14xxx/CVE-2018-14675.json new file mode 100644 index 00000000000..86d5280681c --- /dev/null +++ b/2018/14xxx/CVE-2018-14675.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-14675", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/14xxx/CVE-2018-14676.json b/2018/14xxx/CVE-2018-14676.json new file mode 100644 index 00000000000..c9c3d090a09 --- /dev/null +++ b/2018/14xxx/CVE-2018-14676.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-14676", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/14xxx/CVE-2018-14677.json b/2018/14xxx/CVE-2018-14677.json new file mode 100644 index 00000000000..45652e4799a --- /dev/null +++ b/2018/14xxx/CVE-2018-14677.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-14677", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}