diff --git a/2018/11xxx/CVE-2018-11508.json b/2018/11xxx/CVE-2018-11508.json new file mode 100644 index 00000000000..3adc1b3064e --- /dev/null +++ b/2018/11xxx/CVE-2018-11508.json @@ -0,0 +1,77 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11508", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "The compat_get_timex function in kernel/compat.c in the Linux kernel before 4.16.9 allows local users to obtain sensitive information from kernel memory via adjtimex." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0a0b98734479aa5b3c671d5190e86273372cab95", + "refsource" : "MISC", + "url" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0a0b98734479aa5b3c671d5190e86273372cab95" + }, + { + "name" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=1574", + "refsource" : "MISC", + "url" : "https://bugs.chromium.org/p/project-zero/issues/detail?id=1574" + }, + { + "name" : "https://github.com/torvalds/linux/commit/0a0b98734479aa5b3c671d5190e86273372cab95", + "refsource" : "MISC", + "url" : "https://github.com/torvalds/linux/commit/0a0b98734479aa5b3c671d5190e86273372cab95" + }, + { + "name" : "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.9", + "refsource" : "MISC", + "url" : "https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.9" + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11509.json b/2018/11xxx/CVE-2018-11509.json new file mode 100644 index 00000000000..8e54bf5e934 --- /dev/null +++ b/2018/11xxx/CVE-2018-11509.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11509", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11510.json b/2018/11xxx/CVE-2018-11510.json new file mode 100644 index 00000000000..f0ff2a4017d --- /dev/null +++ b/2018/11xxx/CVE-2018-11510.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11510", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11511.json b/2018/11xxx/CVE-2018-11511.json new file mode 100644 index 00000000000..f30340ddc4a --- /dev/null +++ b/2018/11xxx/CVE-2018-11511.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11511", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/11xxx/CVE-2018-11512.json b/2018/11xxx/CVE-2018-11512.json new file mode 100644 index 00000000000..37433c76974 --- /dev/null +++ b/2018/11xxx/CVE-2018-11512.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-11512", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Stored cross-site scripting (XSS) vulnerability in the \"Website's name\" field found in the \"Settings\" page under the \"General\" menu in Creatiwity wityCMS 0.6.1 allows remote attackers to inject arbitrary web script or HTML via a crafted website name by doing an authenticated POST HTTP request to admin/settings/general." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/Creatiwity/wityCMS/commit/7967e5bf15b4d2ee6b85b56e82d7e1229147de44", + "refsource" : "MISC", + "url" : "https://github.com/Creatiwity/wityCMS/commit/7967e5bf15b4d2ee6b85b56e82d7e1229147de44" + }, + { + "name" : "https://github.com/Creatiwity/wityCMS/issues/150", + "refsource" : "MISC", + "url" : "https://github.com/Creatiwity/wityCMS/issues/150" + } + ] + } +}