diff --git a/2018/19xxx/CVE-2018-19493.json b/2018/19xxx/CVE-2018-19493.json index db07dc7ddc9..1c061e9b9e3 100644 --- a/2018/19xxx/CVE-2018-19493.json +++ b/2018/19xxx/CVE-2018-19493.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://about.gitlab.com/2018/11/28/security-release-gitlab-11-dot-5-dot-1-released/", "url": "https://about.gitlab.com/2018/11/28/security-release-gitlab-11-dot-5-dot-1-released/" + }, + { + "refsource": "BID", + "name": "109122", + "url": "http://www.securityfocus.com/bid/109122" } ] } diff --git a/2018/19xxx/CVE-2018-19569.json b/2018/19xxx/CVE-2018-19569.json index ca5a52c252b..61e3a05a01a 100644 --- a/2018/19xxx/CVE-2018-19569.json +++ b/2018/19xxx/CVE-2018-19569.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://about.gitlab.com/2018/11/28/security-release-gitlab-11-dot-5-dot-1-released/", "url": "https://about.gitlab.com/2018/11/28/security-release-gitlab-11-dot-5-dot-1-released/" + }, + { + "refsource": "BID", + "name": "109118", + "url": "http://www.securityfocus.com/bid/109118" } ] } diff --git a/2018/19xxx/CVE-2018-19575.json b/2018/19xxx/CVE-2018-19575.json index c7b4213e975..ab8e7c45c3c 100644 --- a/2018/19xxx/CVE-2018-19575.json +++ b/2018/19xxx/CVE-2018-19575.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://about.gitlab.com/2018/11/28/security-release-gitlab-11-dot-5-dot-1-released/", "url": "https://about.gitlab.com/2018/11/28/security-release-gitlab-11-dot-5-dot-1-released/" + }, + { + "refsource": "BID", + "name": "109121", + "url": "http://www.securityfocus.com/bid/109121" } ] } diff --git a/2019/1010xxx/CVE-2019-1010003.json b/2019/1010xxx/CVE-2019-1010003.json index f5e8df7cc43..42d5629bcde 100644 --- a/2019/1010xxx/CVE-2019-1010003.json +++ b/2019/1010xxx/CVE-2019-1010003.json @@ -1,17 +1,61 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { + "ASSIGNER": "cve-assign@distributedweaknessfiling.org", "ID": "CVE-2019-1010003", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "Leanote", + "version": { + "version_data": [ + { + "version_value": "prior to version 2.6" + } + ] + } + } + ] + }, + "vendor_name": "Leanote" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Leanote prior to version 2.6 is affected by: Cross Site Scripting (XSS)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Cross Site Scripting (XSS)" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/leanote/leanote/issues/719", + "refsource": "MISC", + "name": "https://github.com/leanote/leanote/issues/719" } ] } diff --git a/2019/12xxx/CVE-2019-12838.json b/2019/12xxx/CVE-2019-12838.json index f1f13a868f1..eaf012059a7 100644 --- a/2019/12xxx/CVE-2019-12838.json +++ b/2019/12xxx/CVE-2019-12838.json @@ -1,18 +1,80 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-12838", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-12838", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "SchedMD Slurm 17.11.x, 18.08.0 through 18.08.7, and 19.05.0 allows SQL Injection." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.schedmd.com/news.php", + "refsource": "MISC", + "name": "https://www.schedmd.com/news.php" + }, + { + "url": "https://lists.schedmd.com/pipermail/slurm-announce/2019/", + "refsource": "MISC", + "name": "https://lists.schedmd.com/pipermail/slurm-announce/2019/" + }, + { + "refsource": "CONFIRM", + "name": "https://www.schedmd.com/news.php?id=218", + "url": "https://www.schedmd.com/news.php?id=218" + }, + { + "refsource": "CONFIRM", + "name": "https://lists.schedmd.com/pipermail/slurm-announce/2019/000025.html", + "url": "https://lists.schedmd.com/pipermail/slurm-announce/2019/000025.html" + } + ] + }, + "source": { + "discovery": "INTERNAL" } } \ No newline at end of file diff --git a/2019/13xxx/CVE-2019-13146.json b/2019/13xxx/CVE-2019-13146.json index dd19619d7a9..4f1aeb41b4a 100644 --- a/2019/13xxx/CVE-2019-13146.json +++ b/2019/13xxx/CVE-2019-13146.json @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/ankane/field_test/issues/17", "url": "https://github.com/ankane/field_test/issues/17" + }, + { + "refsource": "BID", + "name": "109114", + "url": "http://www.securityfocus.com/bid/109114" } ] } diff --git a/2019/13xxx/CVE-2019-13505.json b/2019/13xxx/CVE-2019-13505.json new file mode 100644 index 00000000000..0a62a1b048c --- /dev/null +++ b/2019/13xxx/CVE-2019-13505.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-13505", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The Appointment Hour Booking plugin 1.1.44 for WordPress allows XSS via the E-mail field, as demonstrated by email_1." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/ivoschyk-cs/CVE-s/blob/master/Appointment%20Hour%20Booking%20%E2%80%93%20WordPress%20Booking%20Plugin%20--%20stored%20XSS", + "refsource": "MISC", + "name": "https://github.com/ivoschyk-cs/CVE-s/blob/master/Appointment%20Hour%20Booking%20%E2%80%93%20WordPress%20Booking%20Plugin%20--%20stored%20XSS" + }, + { + "url": "https://wordpress.org/plugins/appointment-hour-booking/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/appointment-hour-booking/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2019/6xxx/CVE-2019-6631.json b/2019/6xxx/CVE-2019-6631.json index 83e462c61e1..4c564fef5a8 100644 --- a/2019/6xxx/CVE-2019-6631.json +++ b/2019/6xxx/CVE-2019-6631.json @@ -48,6 +48,11 @@ "refsource": "CONFIRM", "name": "https://support.f5.com/csp/article/K19501795", "url": "https://support.f5.com/csp/article/K19501795" + }, + { + "refsource": "BID", + "name": "109119", + "url": "http://www.securityfocus.com/bid/109119" } ] }, diff --git a/2019/6xxx/CVE-2019-6633.json b/2019/6xxx/CVE-2019-6633.json index 41ad0f881d3..39e9b606fdb 100644 --- a/2019/6xxx/CVE-2019-6633.json +++ b/2019/6xxx/CVE-2019-6633.json @@ -60,6 +60,11 @@ "refsource": "CONFIRM", "name": "https://support.f5.com/csp/article/K73522927", "url": "https://support.f5.com/csp/article/K73522927" + }, + { + "refsource": "BID", + "name": "109113", + "url": "http://www.securityfocus.com/bid/109113" } ] }, diff --git a/2019/8xxx/CVE-2019-8920.json b/2019/8xxx/CVE-2019-8920.json index b50799d02d6..ce0026624cd 100644 --- a/2019/8xxx/CVE-2019-8920.json +++ b/2019/8xxx/CVE-2019-8920.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://blog.lucideus.com/2019/07/xampp-170-reflected-cross-site-scripting.html", "url": "https://blog.lucideus.com/2019/07/xampp-170-reflected-cross-site-scripting.html" + }, + { + "refsource": "BID", + "name": "109120", + "url": "http://www.securityfocus.com/bid/109120" } ] }