From f5dc212802f373304afa44f861a0454b78dac49c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 6 Feb 2019 18:04:09 -0500 Subject: [PATCH] - Synchronized data. --- 2018/20xxx/CVE-2018-20760.json | 67 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20761.json | 67 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20762.json | 67 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20763.json | 67 ++++++++++++++++++++++++++++++++++ 2018/7xxx/CVE-2018-7813.json | 2 + 2018/7xxx/CVE-2018-7814.json | 2 + 2018/7xxx/CVE-2018-7815.json | 2 + 2018/7xxx/CVE-2018-7817.json | 2 + 2018/7xxx/CVE-2018-7839.json | 2 + 9 files changed, 278 insertions(+) create mode 100644 2018/20xxx/CVE-2018-20760.json create mode 100644 2018/20xxx/CVE-2018-20761.json create mode 100644 2018/20xxx/CVE-2018-20762.json create mode 100644 2018/20xxx/CVE-2018-20763.json diff --git a/2018/20xxx/CVE-2018-20760.json b/2018/20xxx/CVE-2018-20760.json new file mode 100644 index 00000000000..69d9c2dc3ee --- /dev/null +++ b/2018/20xxx/CVE-2018-20760.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20760", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "In GPAC 0.7.2, gf_text_get_utf8_line in media_tools/text_import.c in libgpac_static.a allows an out-of-bounds write because a certain -1 return value is mishandled." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/gpac/gpac/commit/4c1360818fc8948e9307059fba4dc47ba8ad255d", + "refsource" : "MISC", + "url" : "https://github.com/gpac/gpac/commit/4c1360818fc8948e9307059fba4dc47ba8ad255d" + }, + { + "name" : "https://github.com/gpac/gpac/issues/1177", + "refsource" : "MISC", + "url" : "https://github.com/gpac/gpac/issues/1177" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20761.json b/2018/20xxx/CVE-2018-20761.json new file mode 100644 index 00000000000..9f75d372e9f --- /dev/null +++ b/2018/20xxx/CVE-2018-20761.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20761", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "GPAC version 0.7.2 and earlier has a Buffer Overflow vulnerability in the gf_sm_load_init function in scene_manager.c in libgpac_static.a." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658", + "refsource" : "MISC", + "url" : "https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658" + }, + { + "name" : "https://github.com/gpac/gpac/issues/1186", + "refsource" : "MISC", + "url" : "https://github.com/gpac/gpac/issues/1186" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20762.json b/2018/20xxx/CVE-2018-20762.json new file mode 100644 index 00000000000..3e3bd51f3dd --- /dev/null +++ b/2018/20xxx/CVE-2018-20762.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20762", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "GPAC version 0.7.2 and earlier has a buffer overflow vulnerability in the cat_multiple_files function in applications/mp4box/fileimport.c when MP4Box is used for a local directory containing crafted filenames." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658", + "refsource" : "MISC", + "url" : "https://github.com/gpac/gpac/commit/35ab4475a7df9b2a4bcab235e379c0c3ec543658" + }, + { + "name" : "https://github.com/gpac/gpac/issues/1187", + "refsource" : "MISC", + "url" : "https://github.com/gpac/gpac/issues/1187" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20763.json b/2018/20xxx/CVE-2018-20763.json new file mode 100644 index 00000000000..d236fa3ca31 --- /dev/null +++ b/2018/20xxx/CVE-2018-20763.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20763", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "In GPAC through 0.7.2, gf_text_get_utf8_line in media_tools/text_import.c in libgpac_static.a allows an out-of-bounds write because of missing szLineConv bounds checking." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/gpac/gpac/commit/1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd", + "refsource" : "MISC", + "url" : "https://github.com/gpac/gpac/commit/1c449a34fe0b50aaffb881bfb9d7c5ab0bb18cdd" + }, + { + "name" : "https://github.com/gpac/gpac/issues/1188", + "refsource" : "MISC", + "url" : "https://github.com/gpac/gpac/issues/1188" + } + ] + } +} diff --git a/2018/7xxx/CVE-2018-7813.json b/2018/7xxx/CVE-2018-7813.json index 87ca92f2aa6..c436bcbffdd 100644 --- a/2018/7xxx/CVE-2018-7813.json +++ b/2018/7xxx/CVE-2018-7813.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.schneider-electric.com/ww/en/download/document/SEVD-2018-338-01", + "refsource" : "CONFIRM", "url" : "https://www.schneider-electric.com/ww/en/download/document/SEVD-2018-338-01" } ] diff --git a/2018/7xxx/CVE-2018-7814.json b/2018/7xxx/CVE-2018-7814.json index e6422fdd229..ae330abbcb5 100644 --- a/2018/7xxx/CVE-2018-7814.json +++ b/2018/7xxx/CVE-2018-7814.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.schneider-electric.com/ww/en/download/document/SEVD-2018-338-01", + "refsource" : "CONFIRM", "url" : "https://www.schneider-electric.com/ww/en/download/document/SEVD-2018-338-01" } ] diff --git a/2018/7xxx/CVE-2018-7815.json b/2018/7xxx/CVE-2018-7815.json index b0c20dd14a7..6e8cb5721e4 100644 --- a/2018/7xxx/CVE-2018-7815.json +++ b/2018/7xxx/CVE-2018-7815.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.schneider-electric.com/ww/en/download/document/SEVD-2018-338-01", + "refsource" : "CONFIRM", "url" : "https://www.schneider-electric.com/ww/en/download/document/SEVD-2018-338-01" } ] diff --git a/2018/7xxx/CVE-2018-7817.json b/2018/7xxx/CVE-2018-7817.json index c3deb3532db..7ed24062d41 100644 --- a/2018/7xxx/CVE-2018-7817.json +++ b/2018/7xxx/CVE-2018-7817.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-361-01/", + "refsource" : "CONFIRM", "url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-361-01/" } ] diff --git a/2018/7xxx/CVE-2018-7839.json b/2018/7xxx/CVE-2018-7839.json index d6b4dd4f936..9ff2ef69a59 100644 --- a/2018/7xxx/CVE-2018-7839.json +++ b/2018/7xxx/CVE-2018-7839.json @@ -53,6 +53,8 @@ "references" : { "reference_data" : [ { + "name" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-354-03/", + "refsource" : "CONFIRM", "url" : "https://www.schneider-electric.com/en/download/document/SEVD-2018-354-03/" } ]