From cf3bb32509492a762f007a8b18491107bfeb2750 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 9 May 2018 22:02:34 -0400 Subject: [PATCH] - Synchronized data. --- 2018/10xxx/CVE-2018-10952.json | 62 ++++++++++++++++++++++++++++++++++ 2018/10xxx/CVE-2018-10953.json | 62 ++++++++++++++++++++++++++++++++++ 2018/10xxx/CVE-2018-10954.json | 62 ++++++++++++++++++++++++++++++++++ 2018/10xxx/CVE-2018-10955.json | 62 ++++++++++++++++++++++++++++++++++ 2018/10xxx/CVE-2018-10956.json | 18 ++++++++++ 2018/10xxx/CVE-2018-10957.json | 62 ++++++++++++++++++++++++++++++++++ 2018/10xxx/CVE-2018-10958.json | 62 ++++++++++++++++++++++++++++++++++ 2018/10xxx/CVE-2018-10959.json | 18 ++++++++++ 2018/10xxx/CVE-2018-10960.json | 18 ++++++++++ 2018/10xxx/CVE-2018-10961.json | 18 ++++++++++ 2018/10xxx/CVE-2018-10962.json | 62 ++++++++++++++++++++++++++++++++++ 2018/10xxx/CVE-2018-10963.json | 62 ++++++++++++++++++++++++++++++++++ 12 files changed, 568 insertions(+) create mode 100644 2018/10xxx/CVE-2018-10952.json create mode 100644 2018/10xxx/CVE-2018-10953.json create mode 100644 2018/10xxx/CVE-2018-10954.json create mode 100644 2018/10xxx/CVE-2018-10955.json create mode 100644 2018/10xxx/CVE-2018-10956.json create mode 100644 2018/10xxx/CVE-2018-10957.json create mode 100644 2018/10xxx/CVE-2018-10958.json create mode 100644 2018/10xxx/CVE-2018-10959.json create mode 100644 2018/10xxx/CVE-2018-10960.json create mode 100644 2018/10xxx/CVE-2018-10961.json create mode 100644 2018/10xxx/CVE-2018-10962.json create mode 100644 2018/10xxx/CVE-2018-10963.json diff --git a/2018/10xxx/CVE-2018-10952.json b/2018/10xxx/CVE-2018-10952.json new file mode 100644 index 00000000000..b8bac47d187 --- /dev/null +++ b/2018/10xxx/CVE-2018-10952.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10952", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "In 2345 Security Guard 3.7, the driver file (2345BdPcSafe.sys, X64 version) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCTL 0x00222088." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222088", + "refsource" : "MISC", + "url" : "https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222088" + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10953.json b/2018/10xxx/CVE-2018-10953.json new file mode 100644 index 00000000000..166887427b1 --- /dev/null +++ b/2018/10xxx/CVE-2018-10953.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10953", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "In 2345 Security Guard 3.7, the driver file (2345BdPcSafe.sys, X64 version) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCTL 0x0022204C." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x0022204C", + "refsource" : "MISC", + "url" : "https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x0022204C" + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10954.json b/2018/10xxx/CVE-2018-10954.json new file mode 100644 index 00000000000..521e090deb6 --- /dev/null +++ b/2018/10xxx/CVE-2018-10954.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10954", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "In 2345 Security Guard 3.7, the driver file (2345BdPcSafe.sys, X64 version) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCTL 0x00222550." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222550", + "refsource" : "MISC", + "url" : "https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222550" + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10955.json b/2018/10xxx/CVE-2018-10955.json new file mode 100644 index 00000000000..3911e7c857d --- /dev/null +++ b/2018/10xxx/CVE-2018-10955.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10955", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "In 2345 Security Guard 3.7, the driver file (2345BdPcSafe.sys, X64 version) allows local users to cause a denial of service (BSOD) or possibly have unspecified other impact because of not validating input values from IOCTL 0x00222548." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222548", + "refsource" : "MISC", + "url" : "https://github.com/anhkgg/poc/tree/master/2345%20security%20guard/2345BdPcSafe.sys-x64-0x00222548" + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10956.json b/2018/10xxx/CVE-2018-10956.json new file mode 100644 index 00000000000..2e96d214bd5 --- /dev/null +++ b/2018/10xxx/CVE-2018-10956.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10956", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10957.json b/2018/10xxx/CVE-2018-10957.json new file mode 100644 index 00000000000..0ea4b9bf3f9 --- /dev/null +++ b/2018/10xxx/CVE-2018-10957.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10957", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "CSRF exists on D-Link DIR-868L devices, leading to (for example) a change to the Admin password. hedwig.cgi and pigwidgeon.cgi are two of the affected components." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://packetstormsecurity.com/files/147525/D-Link-DIR-868L-1.12-Cross-Site-Request-Forgery.html", + "refsource" : "MISC", + "url" : "https://packetstormsecurity.com/files/147525/D-Link-DIR-868L-1.12-Cross-Site-Request-Forgery.html" + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10958.json b/2018/10xxx/CVE-2018-10958.json new file mode 100644 index 00000000000..1a88fc2bb6f --- /dev/null +++ b/2018/10xxx/CVE-2018-10958.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10958", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "In types.cpp in Exiv2 0.26, a large size value may lead to a SIGABRT during an attempt at memory allocation for an Exiv2::Internal::PngChunk::zlibUncompress call." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/Exiv2/exiv2/issues/302", + "refsource" : "MISC", + "url" : "https://github.com/Exiv2/exiv2/issues/302" + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10959.json b/2018/10xxx/CVE-2018-10959.json new file mode 100644 index 00000000000..8ebd15d0a58 --- /dev/null +++ b/2018/10xxx/CVE-2018-10959.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10959", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10960.json b/2018/10xxx/CVE-2018-10960.json new file mode 100644 index 00000000000..0b8fb7a5319 --- /dev/null +++ b/2018/10xxx/CVE-2018-10960.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10960", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10961.json b/2018/10xxx/CVE-2018-10961.json new file mode 100644 index 00000000000..d2c72613dea --- /dev/null +++ b/2018/10xxx/CVE-2018-10961.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10961", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10962.json b/2018/10xxx/CVE-2018-10962.json new file mode 100644 index 00000000000..56466f822ea --- /dev/null +++ b/2018/10xxx/CVE-2018-10962.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10962", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in Shanghai 2345 Security Guard 3.7.0. 2345MPCSafe.exe, 2345SafeTray.exe, and 2345Speedup.exe allow local users to bypass intended process protections, and consequently terminate processes, because mouse_event is not properly considered." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/rebol0x6c/2345_mouse_poc", + "refsource" : "MISC", + "url" : "https://github.com/rebol0x6c/2345_mouse_poc" + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10963.json b/2018/10xxx/CVE-2018-10963.json new file mode 100644 index 00000000000..4bae9b22ef9 --- /dev/null +++ b/2018/10xxx/CVE-2018-10963.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10963", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "The TIFFWriteDirectorySec() function in tif_dirwrite.c in LibTIFF through 4.0.9 allows remote attackers to cause a denial of service (assertion failure and application crash) via a crafted file." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "http://bugzilla.maptools.org/show_bug.cgi?id=2795", + "refsource" : "MISC", + "url" : "http://bugzilla.maptools.org/show_bug.cgi?id=2795" + } + ] + } +}