From e571578d0a360b87dff7388e910501b6d98aba6c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 23 Nov 2018 14:04:33 -0500 Subject: [PATCH] - Synchronized data. --- 2018/19xxx/CVE-2018-19499.json | 62 +++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19500.json | 18 +++++++++ 2018/19xxx/CVE-2018-19501.json | 18 +++++++++ 2018/19xxx/CVE-2018-19502.json | 67 ++++++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19503.json | 67 ++++++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19504.json | 67 ++++++++++++++++++++++++++++++++++ 6 files changed, 299 insertions(+) create mode 100644 2018/19xxx/CVE-2018-19499.json create mode 100644 2018/19xxx/CVE-2018-19500.json create mode 100644 2018/19xxx/CVE-2018-19501.json create mode 100644 2018/19xxx/CVE-2018-19502.json create mode 100644 2018/19xxx/CVE-2018-19503.json create mode 100644 2018/19xxx/CVE-2018-19504.json diff --git a/2018/19xxx/CVE-2018-19499.json b/2018/19xxx/CVE-2018-19499.json new file mode 100644 index 00000000000..2ffd13b1abf --- /dev/null +++ b/2018/19xxx/CVE-2018-19499.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19499", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Vanilla before 2.5.5 and 2.6.x before 2.6.2 allows Remote Code Execution because authenticated administrators have a reachable call to unserialize in the Gdn_Format class." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://hackerone.com/reports/407552", + "refsource" : "MISC", + "url" : "https://hackerone.com/reports/407552" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19500.json b/2018/19xxx/CVE-2018-19500.json new file mode 100644 index 00000000000..90b391676b6 --- /dev/null +++ b/2018/19xxx/CVE-2018-19500.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19500", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19501.json b/2018/19xxx/CVE-2018-19501.json new file mode 100644 index 00000000000..e6cd2906d5f --- /dev/null +++ b/2018/19xxx/CVE-2018-19501.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19501", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19502.json b/2018/19xxx/CVE-2018-19502.json new file mode 100644 index 00000000000..5874eed60f8 --- /dev/null +++ b/2018/19xxx/CVE-2018-19502.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19502", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.1. There was a heap-based buffer overflow in the function excluded_channels() in libfaad/syntax.c." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/TeamSeri0us/pocs/tree/master/faad", + "refsource" : "MISC", + "url" : "https://github.com/TeamSeri0us/pocs/tree/master/faad" + }, + { + "name" : "https://sourceforge.net/p/faac/bugs/240/", + "refsource" : "MISC", + "url" : "https://sourceforge.net/p/faac/bugs/240/" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19503.json b/2018/19xxx/CVE-2018-19503.json new file mode 100644 index 00000000000..f507c693bf7 --- /dev/null +++ b/2018/19xxx/CVE-2018-19503.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19503", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.1. There was a stack-based buffer overflow in the function calculate_gain() in libfaad/sbr_hfadj.c." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/TeamSeri0us/pocs/tree/master/faad", + "refsource" : "MISC", + "url" : "https://github.com/TeamSeri0us/pocs/tree/master/faad" + }, + { + "name" : "https://sourceforge.net/p/faac/bugs/240/", + "refsource" : "MISC", + "url" : "https://sourceforge.net/p/faac/bugs/240/" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19504.json b/2018/19xxx/CVE-2018-19504.json new file mode 100644 index 00000000000..0a99156943f --- /dev/null +++ b/2018/19xxx/CVE-2018-19504.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19504", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in Freeware Advanced Audio Decoder 2 (FAAD2) 2.8.1. There is a NULL pointer dereference in ifilter_bank() in libfaad/filtbank.c." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/TeamSeri0us/pocs/tree/master/faad", + "refsource" : "MISC", + "url" : "https://github.com/TeamSeri0us/pocs/tree/master/faad" + }, + { + "name" : "https://sourceforge.net/p/faac/bugs/240/", + "refsource" : "MISC", + "url" : "https://sourceforge.net/p/faac/bugs/240/" + } + ] + } +}