From 3837ab3ddbbf70c2b658ad401f02637ac3b1c88e Mon Sep 17 00:00:00 2001 From: CVE Team Date: Tue, 20 Aug 2019 15:00:48 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2011/5xxx/CVE-2011-5328.json | 62 +++++++++++++++++++++++++++++++ 2014/10xxx/CVE-2014-10381.json | 62 +++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9317.json | 62 +++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9318.json | 62 +++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9329.json | 62 +++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9330.json | 62 +++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9331.json | 62 +++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9332.json | 62 +++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10893.json | 62 +++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10913.json | 62 +++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10914.json | 62 +++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10915.json | 62 +++++++++++++++++++++++++++++++ 2017/18xxx/CVE-2017-18517.json | 62 +++++++++++++++++++++++++++++++ 2017/18xxx/CVE-2017-18520.json | 67 ++++++++++++++++++++++++++++++++++ 2017/18xxx/CVE-2017-18567.json | 62 +++++++++++++++++++++++++++++++ 2017/18xxx/CVE-2017-18568.json | 62 +++++++++++++++++++++++++++++++ 2017/18xxx/CVE-2017-18569.json | 62 +++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15238.json | 62 +++++++++++++++++++++++++++++++ 2019/6xxx/CVE-2019-6111.json | 5 +++ 19 files changed, 1126 insertions(+) create mode 100644 2011/5xxx/CVE-2011-5328.json create mode 100644 2014/10xxx/CVE-2014-10381.json create mode 100644 2015/9xxx/CVE-2015-9317.json create mode 100644 2015/9xxx/CVE-2015-9318.json create mode 100644 2015/9xxx/CVE-2015-9329.json create mode 100644 2015/9xxx/CVE-2015-9330.json create mode 100644 2015/9xxx/CVE-2015-9331.json create mode 100644 2015/9xxx/CVE-2015-9332.json create mode 100644 2016/10xxx/CVE-2016-10893.json create mode 100644 2016/10xxx/CVE-2016-10913.json create mode 100644 2016/10xxx/CVE-2016-10914.json create mode 100644 2016/10xxx/CVE-2016-10915.json create mode 100644 2017/18xxx/CVE-2017-18517.json create mode 100644 2017/18xxx/CVE-2017-18520.json create mode 100644 2017/18xxx/CVE-2017-18567.json create mode 100644 2017/18xxx/CVE-2017-18568.json create mode 100644 2017/18xxx/CVE-2017-18569.json create mode 100644 2019/15xxx/CVE-2019-15238.json diff --git a/2011/5xxx/CVE-2011-5328.json b/2011/5xxx/CVE-2011-5328.json new file mode 100644 index 00000000000..29b30e3f7d7 --- /dev/null +++ b/2011/5xxx/CVE-2011-5328.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2011-5328", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The user-access-manager plugin before 1.2 for WordPress has CSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/user-access-manager/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/user-access-manager/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2014/10xxx/CVE-2014-10381.json b/2014/10xxx/CVE-2014-10381.json new file mode 100644 index 00000000000..609355745a3 --- /dev/null +++ b/2014/10xxx/CVE-2014-10381.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2014-10381", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The user-domain-whitelist plugin before 1.5 for WordPress has CSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/user-domain-whitelist/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/user-domain-whitelist/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9317.json b/2015/9xxx/CVE-2015-9317.json new file mode 100644 index 00000000000..331626d4f6a --- /dev/null +++ b/2015/9xxx/CVE-2015-9317.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9317", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The awesome-support plugin before 3.1.7 for WordPress has XSS via custom information messages." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/awesome-support/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/awesome-support/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9318.json b/2015/9xxx/CVE-2015-9318.json new file mode 100644 index 00000000000..affc394cb42 --- /dev/null +++ b/2015/9xxx/CVE-2015-9318.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9318", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The awesome-support plugin before 3.1.7 for WordPress has a security issue in which shortcodes are allowed in replies." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/awesome-support/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/awesome-support/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9329.json b/2015/9xxx/CVE-2015-9329.json new file mode 100644 index 00000000000..7cebac8c5e1 --- /dev/null +++ b/2015/9xxx/CVE-2015-9329.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9329", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The wp-all-import plugin before 3.2.5 for WordPress has reflected XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/wp-all-import/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/wp-all-import/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9330.json b/2015/9xxx/CVE-2015-9330.json new file mode 100644 index 00000000000..0721ec40ba7 --- /dev/null +++ b/2015/9xxx/CVE-2015-9330.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9330", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The wp-all-import plugin before 3.2.5 for WordPress has blind SQL injection." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/wp-all-import/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/wp-all-import/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9331.json b/2015/9xxx/CVE-2015-9331.json new file mode 100644 index 00000000000..84ee2381457 --- /dev/null +++ b/2015/9xxx/CVE-2015-9331.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9331", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The wp-all-import plugin before 3.2.4 for WordPress has no prevention of unauthenticated requests to adminInit." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/wp-all-import/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/wp-all-import/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9332.json b/2015/9xxx/CVE-2015-9332.json new file mode 100644 index 00000000000..c56b6b4ae4c --- /dev/null +++ b/2015/9xxx/CVE-2015-9332.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9332", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The uninstall plugin before 1.2 for WordPress has CSRF to delete all tables via the wp-admin/admin-ajax.php?action=uninstall URI." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/uninstall/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/uninstall/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10893.json b/2016/10xxx/CVE-2016-10893.json new file mode 100644 index 00000000000..25288445e89 --- /dev/null +++ b/2016/10xxx/CVE-2016-10893.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10893", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The crayon-syntax-highlighter plugin before 2.8.4 for WordPress has multiple XSS issues via AJAX requests." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/crayon-syntax-highlighter/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/crayon-syntax-highlighter/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10913.json b/2016/10xxx/CVE-2016-10913.json new file mode 100644 index 00000000000..20f2559c98a --- /dev/null +++ b/2016/10xxx/CVE-2016-10913.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10913", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The wp-latest-posts plugin before 3.7.5 for WordPress has XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/wp-latest-posts/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/wp-latest-posts/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10914.json b/2016/10xxx/CVE-2016-10914.json new file mode 100644 index 00000000000..6817d217eea --- /dev/null +++ b/2016/10xxx/CVE-2016-10914.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10914", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The add-from-server plugin before 3.3.2 for WordPress has CSRF for importing a large file." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/add-from-server/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/add-from-server/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10915.json b/2016/10xxx/CVE-2016-10915.json new file mode 100644 index 00000000000..6e9bf73024b --- /dev/null +++ b/2016/10xxx/CVE-2016-10915.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10915", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The popup-by-supsystic plugin before 1.7.9 for WordPress has CSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/popup-by-supsystic/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/popup-by-supsystic/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18517.json b/2017/18xxx/CVE-2017-18517.json new file mode 100644 index 00000000000..b658ff6bd01 --- /dev/null +++ b/2017/18xxx/CVE-2017-18517.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18517", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The bws-pinterest plugin before 1.0.5 for WordPress has multiple XSS issues." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/bws-pinterest/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/bws-pinterest/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18520.json b/2017/18xxx/CVE-2017-18520.json new file mode 100644 index 00000000000..dd0b63e9045 --- /dev/null +++ b/2017/18xxx/CVE-2017-18520.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18520", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The democracy-poll plugin before 5.4 for WordPress has XSS via update_l10n in admin/class.DemAdminInit.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/democracy-poll/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/democracy-poll/#developers" + }, + { + "url": "https://www.pluginvulnerabilities.com/2017/02/22/cross-site-request-forgery-csrfcross-site-scripting-xss-vulnerability-in-democracy-poll/", + "refsource": "MISC", + "name": "https://www.pluginvulnerabilities.com/2017/02/22/cross-site-request-forgery-csrfcross-site-scripting-xss-vulnerability-in-democracy-poll/" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18567.json b/2017/18xxx/CVE-2017-18567.json new file mode 100644 index 00000000000..81cdbcb5365 --- /dev/null +++ b/2017/18xxx/CVE-2017-18567.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18567", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The wp-all-import plugin before 3.4.6 for WordPress has XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/wp-all-import/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/wp-all-import/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18568.json b/2017/18xxx/CVE-2017-18568.json new file mode 100644 index 00000000000..338c550df05 --- /dev/null +++ b/2017/18xxx/CVE-2017-18568.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18568", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The my-wp-translate plugin before 1.0.4 for WordPress has XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/my-wp-translate/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/my-wp-translate/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18569.json b/2017/18xxx/CVE-2017-18569.json new file mode 100644 index 00000000000..f417fb7f205 --- /dev/null +++ b/2017/18xxx/CVE-2017-18569.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18569", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The my-wp-translate plugin before 1.0.4 for WordPress has CSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/my-wp-translate/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/my-wp-translate/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15238.json b/2019/15xxx/CVE-2019-15238.json new file mode 100644 index 00000000000..da73b2aba13 --- /dev/null +++ b/2019/15xxx/CVE-2019-15238.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15238", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The cforms2 plugin before 15.0.2 for WordPress has CSRF related to the IP address field." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/cforms2/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/cforms2/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2019/6xxx/CVE-2019-6111.json b/2019/6xxx/CVE-2019-6111.json index 2d29449d370..dbcee6df546 100644 --- a/2019/6xxx/CVE-2019-6111.json +++ b/2019/6xxx/CVE-2019-6111.json @@ -141,6 +141,11 @@ "refsource": "FREEBSD", "name": "FreeBSD-EN-19:10", "url": "https://www.freebsd.org/security/advisories/FreeBSD-EN-19:10.scp.asc" + }, + { + "refsource": "MLIST", + "name": "[mina-dev] 20190820 [jira] [Resolved] (SSHD-925) See if SCP vulnerability CVE-2019-6111 applies and mitigate it if so", + "url": "https://lists.apache.org/thread.html/d540139359de999b0f1c87d05b715be4d7d4bec771e1ae55153c5c7a@%3Cdev.mina.apache.org%3E" } ] }