diff --git a/2017/14xxx/CVE-2017-14522.json b/2017/14xxx/CVE-2017-14522.json index 2d9c4a7a997..b06c9c4b23a 100644 --- a/2017/14xxx/CVE-2017-14522.json +++ b/2017/14xxx/CVE-2017-14522.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "In WonderCMS 2.3.1, the application's input fields accept arbitrary user input resulting in execution of malicious JavaScript." + "value" : "** DISPUTED ** In WonderCMS 2.3.1, the application's input fields accept arbitrary user input resulting in execution of malicious JavaScript. NOTE: the vendor disputes this issue stating that this is a feature that enables only a logged in administrator to write execute JavaScript anywhere on their website." } ] }, diff --git a/2017/14xxx/CVE-2017-14523.json b/2017/14xxx/CVE-2017-14523.json index 1a5c5b3e650..655d64de45c 100644 --- a/2017/14xxx/CVE-2017-14523.json +++ b/2017/14xxx/CVE-2017-14523.json @@ -34,7 +34,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "WonderCMS 2.3.1 is vulnerable to an HTTP Host header injection attack. It uses user-entered values to redirect pages." + "value" : "** DISPUTED ** WonderCMS 2.3.1 is vulnerable to an HTTP Host header injection attack. It uses user-entered values to redirect pages. NOTE: the vendor reports that exploitation is unlikely because the attack can only come from a local machine or from the administrator as a self attack." } ] }, @@ -52,9 +52,6 @@ }, "references" : { "reference_data" : [ - { - "url" : "https://www.exploit-db.com/exploits/43964/" - }, { "url" : "https://securitywarrior9.blogspot.in/2018/01/host-header-injection-in-wonder-cms.html" } diff --git a/2017/18xxx/CVE-2017-18187.json b/2017/18xxx/CVE-2017-18187.json new file mode 100644 index 00000000000..4f509ea1443 --- /dev/null +++ b/2017/18xxx/CVE-2017-18187.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2017-18187", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/7xxx/CVE-2018-7033.json b/2018/7xxx/CVE-2018-7033.json new file mode 100644 index 00000000000..13e32cb6ca7 --- /dev/null +++ b/2018/7xxx/CVE-2018-7033.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-7033", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/7xxx/CVE-2018-7034.json b/2018/7xxx/CVE-2018-7034.json new file mode 100644 index 00000000000..3c96df4c326 --- /dev/null +++ b/2018/7xxx/CVE-2018-7034.json @@ -0,0 +1,60 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-7034", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "TRENDnet TEW-751DR v1.03B03, TEW-752DRU v1.03B01, and TEW733GR v1.03B01 devices allow authentication bypass via an AUTHORIZED_GROUP=1 value, as demonstrated by a request for getcfg.php." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "url" : "https://blogs.securiteam.com/index.php/archives/3627" + } + ] + } +} diff --git a/2018/7xxx/CVE-2018-7035.json b/2018/7xxx/CVE-2018-7035.json new file mode 100644 index 00000000000..190b89e2036 --- /dev/null +++ b/2018/7xxx/CVE-2018-7035.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-7035", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}