From bb3cae1060dacd64139bedaa08adc0eff0e14fe3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Mon, 12 Nov 2018 12:04:34 -0500 Subject: [PATCH] - Synchronized data. --- 2018/19xxx/CVE-2018-19205.json | 67 ++++++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19206.json | 67 ++++++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19207.json | 67 ++++++++++++++++++++++++++++++++++ 3 files changed, 201 insertions(+) create mode 100644 2018/19xxx/CVE-2018-19205.json create mode 100644 2018/19xxx/CVE-2018-19206.json create mode 100644 2018/19xxx/CVE-2018-19207.json diff --git a/2018/19xxx/CVE-2018-19205.json b/2018/19xxx/CVE-2018-19205.json new file mode 100644 index 00000000000..92965158f42 --- /dev/null +++ b/2018/19xxx/CVE-2018-19205.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19205", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Roundcube before 1.3.7 mishandles GnuPG MDC integrity-protection warnings, which makes it easier for attackers to obtain sensitive information, a related issue to CVE-2017-17688. This is associated with plugins/enigma/lib/enigma_driver_gnupg.php." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/roundcube/roundcubemail/releases/tag/1.3.7", + "refsource" : "MISC", + "url" : "https://github.com/roundcube/roundcubemail/releases/tag/1.3.7" + }, + { + "name" : "https://roundcube.net/news/2018/07/27/update-1.3.7-released", + "refsource" : "MISC", + "url" : "https://roundcube.net/news/2018/07/27/update-1.3.7-released" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19206.json b/2018/19xxx/CVE-2018-19206.json new file mode 100644 index 00000000000..f8f1df3a434 --- /dev/null +++ b/2018/19xxx/CVE-2018-19206.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19206", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "steps/mail/func.inc in Roundcube before 1.3.8 has XSS via crafted use of