diff --git a/2015/9xxx/CVE-2015-9319.json b/2015/9xxx/CVE-2015-9319.json new file mode 100644 index 00000000000..3013afdfe3e --- /dev/null +++ b/2015/9xxx/CVE-2015-9319.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9319", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The gregs-high-performance-seo plugin before 1.6.2 for WordPress has XSS in the context of an old browser." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/gregs-high-performance-seo/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/gregs-high-performance-seo/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9320.json b/2015/9xxx/CVE-2015-9320.json new file mode 100644 index 00000000000..0ea071e70ca --- /dev/null +++ b/2015/9xxx/CVE-2015-9320.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9320", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The option-tree plugin before 2.5.4 for WordPress has XSS related to add_query_arg." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/option-tree/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/option-tree/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10892.json b/2016/10xxx/CVE-2016-10892.json new file mode 100644 index 00000000000..ecf44b1f6c9 --- /dev/null +++ b/2016/10xxx/CVE-2016-10892.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10892", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The chained-quiz plugin before 1.0 for WordPress has multiple XSS issues." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/chained-quiz/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/chained-quiz/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10895.json b/2016/10xxx/CVE-2016-10895.json new file mode 100644 index 00000000000..f6b00ad3cad --- /dev/null +++ b/2016/10xxx/CVE-2016-10895.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10895", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The option-tree plugin before 2.6.0 for WordPress has XSS via an add_list_item or add_social_links AJAX request." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/option-tree/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/option-tree/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18518.json b/2017/18xxx/CVE-2017-18518.json new file mode 100644 index 00000000000..5e6d2ce8024 --- /dev/null +++ b/2017/18xxx/CVE-2017-18518.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18518", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The bws-smtp plugin before 1.1.0 for WordPress has multiple XSS issues." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/bws-smtp/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/bws-smtp/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18519.json b/2017/18xxx/CVE-2017-18519.json new file mode 100644 index 00000000000..01e7ff9dcd0 --- /dev/null +++ b/2017/18xxx/CVE-2017-18519.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18519", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The customer-area plugin before 7.4.3 for WordPress has XSS via admin pages." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/customer-area/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/customer-area/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18522.json b/2017/18xxx/CVE-2017-18522.json new file mode 100644 index 00000000000..3b14a4c8a67 --- /dev/null +++ b/2017/18xxx/CVE-2017-18522.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18522", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The eelv-newsletter plugin before 4.6.1 for WordPress has XSS in the address book." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/eelv-newsletter/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/eelv-newsletter/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18523.json b/2017/18xxx/CVE-2017-18523.json new file mode 100644 index 00000000000..e7407dcc4bd --- /dev/null +++ b/2017/18xxx/CVE-2017-18523.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18523", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The eelv-newsletter plugin before 4.6.1 for WordPress has CSRF in the address book." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/eelv-newsletter/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/eelv-newsletter/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18524.json b/2017/18xxx/CVE-2017-18524.json new file mode 100644 index 00000000000..66716dd5c40 --- /dev/null +++ b/2017/18xxx/CVE-2017-18524.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18524", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The football-pool plugin before 2.6.5 for WordPress has multiple XSS issues." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/football-pool/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/football-pool/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18526.json b/2017/18xxx/CVE-2017-18526.json new file mode 100644 index 00000000000..4786a86d18e --- /dev/null +++ b/2017/18xxx/CVE-2017-18526.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18526", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The moreads-se plugin before 1.4.7 for WordPress has XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/moreads-se/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/moreads-se/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18527.json b/2017/18xxx/CVE-2017-18527.json new file mode 100644 index 00000000000..c03c3a42c42 --- /dev/null +++ b/2017/18xxx/CVE-2017-18527.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18527", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The pagination plugin before 1.0.7 for WordPress has multiple XSS issues." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/pagination/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/pagination/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18528.json b/2017/18xxx/CVE-2017-18528.json new file mode 100644 index 00000000000..ad8d51609f3 --- /dev/null +++ b/2017/18xxx/CVE-2017-18528.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18528", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The pdf-print plugin before 1.9.4 for WordPress has multiple XSS issues." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/pdf-print/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/pdf-print/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18529.json b/2017/18xxx/CVE-2017-18529.json new file mode 100644 index 00000000000..2833df0f8a7 --- /dev/null +++ b/2017/18xxx/CVE-2017-18529.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18529", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The promobar plugin before 1.1.1 for WordPress has multiple XSS issues." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/promobar/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/promobar/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18530.json b/2017/18xxx/CVE-2017-18530.json new file mode 100644 index 00000000000..2660ab663e3 --- /dev/null +++ b/2017/18xxx/CVE-2017-18530.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18530", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The rating-bws plugin before 0.2 for WordPress has multiple XSS issues." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/rating-bws/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/rating-bws/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18531.json b/2017/18xxx/CVE-2017-18531.json new file mode 100644 index 00000000000..ea1c394f40c --- /dev/null +++ b/2017/18xxx/CVE-2017-18531.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18531", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The raygun4wp plugin before 1.8.3 for WordPress has XSS in the settings, a different issue than CVE-2017-9288." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/raygun4wp/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/raygun4wp/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18532.json b/2017/18xxx/CVE-2017-18532.json new file mode 100644 index 00000000000..cd85a956f08 --- /dev/null +++ b/2017/18xxx/CVE-2017-18532.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18532", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The realty plugin before 1.1.0 for WordPress has multiple XSS issues." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/realty/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/realty/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18533.json b/2017/18xxx/CVE-2017-18533.json new file mode 100644 index 00000000000..ec072e6045b --- /dev/null +++ b/2017/18xxx/CVE-2017-18533.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18533", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The rimons-twitter-widget plugin before 1.3 for WordPress has XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/rimons-twitter-widget/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/rimons-twitter-widget/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18566.json b/2017/18xxx/CVE-2017-18566.json new file mode 100644 index 00000000000..68258b0a2a6 --- /dev/null +++ b/2017/18xxx/CVE-2017-18566.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18566", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The user-role plugin before 1.5.6 for WordPress has multiple XSS issues." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/user-role/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/user-role/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20978.json b/2018/20xxx/CVE-2018-20978.json new file mode 100644 index 00000000000..82c99c93716 --- /dev/null +++ b/2018/20xxx/CVE-2018-20978.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20978", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The wp-all-import plugin before 3.4.7 for WordPress has XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/wp-all-import/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/wp-all-import/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15231.json b/2019/15xxx/CVE-2019-15231.json index e65b395e2d6..be351d489d1 100644 --- a/2019/15xxx/CVE-2019-15231.json +++ b/2019/15xxx/CVE-2019-15231.json @@ -61,6 +61,11 @@ "url": "https://www.virtualmin.com/node/66890", "refsource": "MISC", "name": "https://www.virtualmin.com/node/66890" + }, + { + "refsource": "MISC", + "name": "https://snyk.io/blog/a-year-old-dormant-malicious-remote-code-execution-vulnerability-discovered-in-webmin/", + "url": "https://snyk.io/blog/a-year-old-dormant-malicious-remote-code-execution-vulnerability-discovered-in-webmin/" } ] }