From 17f8b78159ae3dca41ace71d2d937e4f719a2903 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 22 Mar 2019 00:00:41 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/18xxx/CVE-2018-18409.json | 5 +++ 2019/9xxx/CVE-2019-9908.json | 61 ++++++++++++++++++++++++++++++---- 2019/9xxx/CVE-2019-9909.json | 61 ++++++++++++++++++++++++++++++---- 2019/9xxx/CVE-2019-9910.json | 61 ++++++++++++++++++++++++++++++---- 2019/9xxx/CVE-2019-9911.json | 61 ++++++++++++++++++++++++++++++---- 2019/9xxx/CVE-2019-9912.json | 61 ++++++++++++++++++++++++++++++---- 2019/9xxx/CVE-2019-9913.json | 61 ++++++++++++++++++++++++++++++---- 2019/9xxx/CVE-2019-9914.json | 61 ++++++++++++++++++++++++++++++---- 2019/9xxx/CVE-2019-9915.json | 61 ++++++++++++++++++++++++++++++---- 2019/9xxx/CVE-2019-9916.json | 18 ++++++++++ 2019/9xxx/CVE-2019-9917.json | 18 ++++++++++ 2019/9xxx/CVE-2019-9918.json | 18 ++++++++++ 2019/9xxx/CVE-2019-9919.json | 18 ++++++++++ 2019/9xxx/CVE-2019-9920.json | 18 ++++++++++ 2019/9xxx/CVE-2019-9921.json | 18 ++++++++++ 2019/9xxx/CVE-2019-9922.json | 18 ++++++++++ 16 files changed, 571 insertions(+), 48 deletions(-) create mode 100644 2019/9xxx/CVE-2019-9916.json create mode 100644 2019/9xxx/CVE-2019-9917.json create mode 100644 2019/9xxx/CVE-2019-9918.json create mode 100644 2019/9xxx/CVE-2019-9919.json create mode 100644 2019/9xxx/CVE-2019-9920.json create mode 100644 2019/9xxx/CVE-2019-9921.json create mode 100644 2019/9xxx/CVE-2019-9922.json diff --git a/2018/18xxx/CVE-2018-18409.json b/2018/18xxx/CVE-2018-18409.json index 4eb20fac9ad..268d607bff8 100644 --- a/2018/18xxx/CVE-2018-18409.json +++ b/2018/18xxx/CVE-2018-18409.json @@ -61,6 +61,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-8cdd669aca", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/K6MP4YMCJX4ITOBFX427UMOA6E7ZLJDE/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-2c020ccbd5", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MN5FW6HKPDP7PI2IVNMFSQVIDSCQ5BOR/" } ] } diff --git a/2019/9xxx/CVE-2019-9908.json b/2019/9xxx/CVE-2019-9908.json index 7249585a5a6..c199f75912c 100644 --- a/2019/9xxx/CVE-2019-9908.json +++ b/2019/9xxx/CVE-2019-9908.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-9908", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-9908", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The font-organizer plugin 2.1.1 for WordPress has wp-admin/options-general.php manage_font_id XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.openwall.net/full-disclosure/2019/02/05/8", + "refsource": "MISC", + "name": "https://lists.openwall.net/full-disclosure/2019/02/05/8" + }, + { + "url": "https://security-consulting.icu/blog/2019/02/wordpress-font-organizer-xss/", + "refsource": "MISC", + "name": "https://security-consulting.icu/blog/2019/02/wordpress-font-organizer-xss/" } ] } diff --git a/2019/9xxx/CVE-2019-9909.json b/2019/9xxx/CVE-2019-9909.json index 8402386e983..faabdabf0bc 100644 --- a/2019/9xxx/CVE-2019-9909.json +++ b/2019/9xxx/CVE-2019-9909.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-9909", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-9909", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The \"Donation Plugin and Fundraising Platform\" plugin before 2.3.1 for WordPress has wp-admin/edit.php csv XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.openwall.net/full-disclosure/2019/02/05/9", + "refsource": "MISC", + "name": "https://lists.openwall.net/full-disclosure/2019/02/05/9" + }, + { + "url": "https://security-consulting.icu/blog/2019/02/wordpress-give-xss/", + "refsource": "MISC", + "name": "https://security-consulting.icu/blog/2019/02/wordpress-give-xss/" } ] } diff --git a/2019/9xxx/CVE-2019-9910.json b/2019/9xxx/CVE-2019-9910.json index e032f407168..def77a35606 100644 --- a/2019/9xxx/CVE-2019-9910.json +++ b/2019/9xxx/CVE-2019-9910.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-9910", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-9910", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The kingcomposer plugin 2.7.6 for WordPress has wp-admin/admin.php?page=kc-mapper id XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.openwall.net/full-disclosure/2019/02/05/11", + "refsource": "MISC", + "name": "https://lists.openwall.net/full-disclosure/2019/02/05/11" + }, + { + "url": "https://security-consulting.icu/blog/2019/02/wordpress-kingcomposer-xss/", + "refsource": "MISC", + "name": "https://security-consulting.icu/blog/2019/02/wordpress-kingcomposer-xss/" } ] } diff --git a/2019/9xxx/CVE-2019-9911.json b/2019/9xxx/CVE-2019-9911.json index 12669537539..c76f99a749e 100644 --- a/2019/9xxx/CVE-2019-9911.json +++ b/2019/9xxx/CVE-2019-9911.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-9911", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-9911", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The social-networks-auto-poster-facebook-twitter-g plugin before 4.2.8 for WordPress has wp-admin/admin.php?page=nxssnap-reposter&action=edit item XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.openwall.net/full-disclosure/2019/02/05/12", + "refsource": "MISC", + "name": "https://lists.openwall.net/full-disclosure/2019/02/05/12" + }, + { + "url": "https://security-consulting.icu/blog/2019/02/wordpress-social-networks-auto-poster-xss/", + "refsource": "MISC", + "name": "https://security-consulting.icu/blog/2019/02/wordpress-social-networks-auto-poster-xss/" } ] } diff --git a/2019/9xxx/CVE-2019-9912.json b/2019/9xxx/CVE-2019-9912.json index 8a605e704ce..b226943151b 100644 --- a/2019/9xxx/CVE-2019-9912.json +++ b/2019/9xxx/CVE-2019-9912.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-9912", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-9912", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The wp-google-maps plugin before 7.10.43 for WordPress has XSS via the wp-admin/admin.php PATH_INFO." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.openwall.net/full-disclosure/2019/02/05/13", + "refsource": "MISC", + "name": "https://lists.openwall.net/full-disclosure/2019/02/05/13" + }, + { + "url": "https://security-consulting.icu/blog/2019/02/wordpress-wpgooglemaps-xss/", + "refsource": "MISC", + "name": "https://security-consulting.icu/blog/2019/02/wordpress-wpgooglemaps-xss/" } ] } diff --git a/2019/9xxx/CVE-2019-9913.json b/2019/9xxx/CVE-2019-9913.json index 119eab5f697..43923d8feea 100644 --- a/2019/9xxx/CVE-2019-9913.json +++ b/2019/9xxx/CVE-2019-9913.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-9913", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-9913", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The wp-live-chat-support plugin before 8.0.18 for WordPress has wp-admin/admin.php?page=wplivechat-menu-gdpr-page term XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.openwall.net/full-disclosure/2019/02/05/14", + "refsource": "MISC", + "name": "https://lists.openwall.net/full-disclosure/2019/02/05/14" + }, + { + "url": "https://security-consulting.icu/blog/2019/02/wordpress-wp-livechat-xss/", + "refsource": "MISC", + "name": "https://security-consulting.icu/blog/2019/02/wordpress-wp-livechat-xss/" } ] } diff --git a/2019/9xxx/CVE-2019-9914.json b/2019/9xxx/CVE-2019-9914.json index 779cefa1711..74b319f152f 100644 --- a/2019/9xxx/CVE-2019-9914.json +++ b/2019/9xxx/CVE-2019-9914.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-9914", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-9914", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The yop-poll plugin before 6.0.3 for WordPress has wp-admin/admin.php?page=yop-polls&action=view-votes poll_id XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.openwall.net/full-disclosure/2019/02/05/15", + "refsource": "MISC", + "name": "https://lists.openwall.net/full-disclosure/2019/02/05/15" + }, + { + "url": "https://security-consulting.icu/blog/2019/02/wordpress-yop-poll-xss/", + "refsource": "MISC", + "name": "https://security-consulting.icu/blog/2019/02/wordpress-yop-poll-xss/" } ] } diff --git a/2019/9xxx/CVE-2019-9915.json b/2019/9xxx/CVE-2019-9915.json index a682d60ae7c..d58cab61807 100644 --- a/2019/9xxx/CVE-2019-9915.json +++ b/2019/9xxx/CVE-2019-9915.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-9915", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-9915", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "GetSimpleCMS 3.3.13 has an Open Redirect via the admin/index.php redirect parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.netsparker.com/web-applications-advisories/ns-18-056-open-redirection-vulnerability-in-getsimplecms/", + "refsource": "MISC", + "name": "https://www.netsparker.com/web-applications-advisories/ns-18-056-open-redirection-vulnerability-in-getsimplecms/" + }, + { + "url": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1300", + "refsource": "MISC", + "name": "https://github.com/GetSimpleCMS/GetSimpleCMS/issues/1300" } ] } diff --git a/2019/9xxx/CVE-2019-9916.json b/2019/9xxx/CVE-2019-9916.json new file mode 100644 index 00000000000..5ac427513c5 --- /dev/null +++ b/2019/9xxx/CVE-2019-9916.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-9916", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9917.json b/2019/9xxx/CVE-2019-9917.json new file mode 100644 index 00000000000..9272a7e6538 --- /dev/null +++ b/2019/9xxx/CVE-2019-9917.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-9917", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9918.json b/2019/9xxx/CVE-2019-9918.json new file mode 100644 index 00000000000..a8d92e12756 --- /dev/null +++ b/2019/9xxx/CVE-2019-9918.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-9918", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9919.json b/2019/9xxx/CVE-2019-9919.json new file mode 100644 index 00000000000..98a0439d45e --- /dev/null +++ b/2019/9xxx/CVE-2019-9919.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-9919", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9920.json b/2019/9xxx/CVE-2019-9920.json new file mode 100644 index 00000000000..cdcb45ef3b0 --- /dev/null +++ b/2019/9xxx/CVE-2019-9920.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-9920", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9921.json b/2019/9xxx/CVE-2019-9921.json new file mode 100644 index 00000000000..05dce35f72e --- /dev/null +++ b/2019/9xxx/CVE-2019-9921.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-9921", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/9xxx/CVE-2019-9922.json b/2019/9xxx/CVE-2019-9922.json new file mode 100644 index 00000000000..d49a6fc16a0 --- /dev/null +++ b/2019/9xxx/CVE-2019-9922.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-9922", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file