diff --git a/2014/0xxx/CVE-2014-0158.json b/2014/0xxx/CVE-2014-0158.json index 9ccd143e356..236e6e14296 100644 --- a/2014/0xxx/CVE-2014-0158.json +++ b/2014/0xxx/CVE-2014-0158.json @@ -2,30 +2,7 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2014-0158", - "STATE" : "PUBLIC" - }, - "affects" : { - "vendor" : { - "vendor_data" : [ - { - "product" : { - "product_data" : [ - { - "product_name" : "n/a", - "version" : { - "version_data" : [ - { - "version_value" : "n/a" - } - ] - } - } - ] - }, - "vendor_name" : "n/a" - } - ] - } + "STATE" : "REJECT" }, "data_format" : "MITRE", "data_type" : "CVE", @@ -34,48 +11,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Open Web Analytics (OWA) before 1.5.7 allows remote attackers to conduct PHP object injection attacks via a crafted serialized object in the owa_event parameter to queue.php." - } - ] - }, - "problemtype" : { - "problemtype_data" : [ - { - "description" : [ - { - "lang" : "eng", - "value" : "n/a" - } - ] - } - ] - }, - "references" : { - "reference_data" : [ - { - "name" : "http://karmainsecurity.com/KIS-2014-03", - "refsource" : "MISC", - "url" : "http://karmainsecurity.com/KIS-2014-03" - }, - { - "name" : "https://secuniaresearch.flexerasoftware.com/advisories/56999", - "refsource" : "MISC", - "url" : "https://secuniaresearch.flexerasoftware.com/advisories/56999" - }, - { - "name" : "https://secuniaresearch.flexerasoftware.com/secunia_research/2014-3/", - "refsource" : "MISC", - "url" : "https://secuniaresearch.flexerasoftware.com/secunia_research/2014-3/" - }, - { - "name" : "http://www.openwebanalytics.com/?p=388", - "refsource" : "CONFIRM", - "url" : "http://www.openwebanalytics.com/?p=388" - }, - { - "name" : "66076", - "refsource" : "BID", - "url" : "http://www.securityfocus.com/bid/66076" + "value" : "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2014-2294. Reason: This candidate is a duplicate of CVE-2014-2294. A typo caused the wrong ID to be used. Notes: All CVE users should reference CVE-2014-2294 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2014/2xxx/CVE-2014-2294.json b/2014/2xxx/CVE-2014-2294.json index 33e406b84d6..268014e4211 100644 --- a/2014/2xxx/CVE-2014-2294.json +++ b/2014/2xxx/CVE-2014-2294.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2014-2294", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,48 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "Open Web Analytics (OWA) before 1.5.7 allows remote attackers to conduct PHP object injection attacks via a crafted serialized object in the owa_event parameter to queue.php." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "http://karmainsecurity.com/KIS-2014-03", + "refsource" : "MISC", + "url" : "http://karmainsecurity.com/KIS-2014-03" + }, + { + "name" : "https://secuniaresearch.flexerasoftware.com/advisories/56999", + "refsource" : "MISC", + "url" : "https://secuniaresearch.flexerasoftware.com/advisories/56999" + }, + { + "name" : "https://secuniaresearch.flexerasoftware.com/secunia_research/2014-3/", + "refsource" : "MISC", + "url" : "https://secuniaresearch.flexerasoftware.com/secunia_research/2014-3/" + }, + { + "name" : "http://www.openwebanalytics.com/?p=388", + "refsource" : "CONFIRM", + "url" : "http://www.openwebanalytics.com/?p=388" + }, + { + "name" : "66076", + "refsource" : "BID", + "url" : "https://www.securityfocus.com/bid/66076" } ] } diff --git a/2018/10xxx/CVE-2018-10185.json b/2018/10xxx/CVE-2018-10185.json new file mode 100644 index 00000000000..337242a1d4a --- /dev/null +++ b/2018/10xxx/CVE-2018-10185.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10185", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "An issue was discovered in TuziCMS v2.0.6. There is a CSRF vulnerability that can add an admin account, as demonstrated by a history.pushState call." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/yeyinshi/tuzicms/issues/1", + "refsource" : "MISC", + "url" : "https://github.com/yeyinshi/tuzicms/issues/1" + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10186.json b/2018/10xxx/CVE-2018-10186.json new file mode 100644 index 00000000000..adcd95abda5 --- /dev/null +++ b/2018/10xxx/CVE-2018-10186.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10186", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/10xxx/CVE-2018-10187.json b/2018/10xxx/CVE-2018-10187.json new file mode 100644 index 00000000000..7ce152dbf0b --- /dev/null +++ b/2018/10xxx/CVE-2018-10187.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-10187", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/7xxx/CVE-2018-7514.json b/2018/7xxx/CVE-2018-7514.json index c9536eefcba..aefd12287f3 100644 --- a/2018/7xxx/CVE-2018-7514.json +++ b/2018/7xxx/CVE-2018-7514.json @@ -35,7 +35,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Parsing malformed project files in Omron CX-One may cause a stack-based buffer overflow." + "value" : "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a stack-based buffer overflow." } ] }, @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", + "refsource" : "MISC", "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ] diff --git a/2018/7xxx/CVE-2018-7530.json b/2018/7xxx/CVE-2018-7530.json index 63255a1f3ba..978fcf5f3a6 100644 --- a/2018/7xxx/CVE-2018-7530.json +++ b/2018/7xxx/CVE-2018-7530.json @@ -35,7 +35,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Parsing malformed project files in Omron CX-One may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition." + "value" : "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may allow the pointer to call an incorrect object resulting in an access of resource using incompatible type condition." } ] }, @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", + "refsource" : "MISC", "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ] diff --git a/2018/8xxx/CVE-2018-8834.json b/2018/8xxx/CVE-2018-8834.json index 53ff134d87a..8cb5c4d2d90 100644 --- a/2018/8xxx/CVE-2018-8834.json +++ b/2018/8xxx/CVE-2018-8834.json @@ -35,7 +35,7 @@ "description_data" : [ { "lang" : "eng", - "value" : "Parsing malformed project files in Omron CX-One may cause a heap-based buffer overflow." + "value" : "Parsing malformed project files in Omron CX-One versions 4.42 and prior, including the following applications: CX-FLnet versions 1.00 and prior, CX-Protocol versions 1.992 and prior, CX-Programmer versions 9.65 and prior, CX-Server versions 5.0.22 and prior, Network Configurator versions 3.63 and prior, and Switch Box Utility versions 1.68 and prior, may cause a heap-based buffer overflow." } ] }, @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02", + "refsource" : "MISC", "url" : "https://ics-cert.us-cert.gov/advisories/ICSA-18-100-02" } ]