"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-08-16 21:00:46 +00:00
parent 81c94ab615
commit 3c474825da
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
30 changed files with 1233 additions and 0 deletions

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2014-10376",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The i-recommend-this plugin before 3.7.3 for WordPress has SQL injection."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/i-recommend-this/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/i-recommend-this/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9322",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The erident-custom-login-and-dashboard plugin before 3.5 for WordPress has CSRF."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/erident-custom-login-and-dashboard/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/erident-custom-login-and-dashboard/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9323",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The 404-to-301 plugin before 2.0.3 for WordPress has SQL injection."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/404-to-301/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/404-to-301/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9324",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The easy-digital-downloads plugin before 2.3.3 for WordPress has SQL injection."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/easy-digital-downloads/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/easy-digital-downloads/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18541",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The xo-security plugin before 1.5.3 for WordPress has XSS."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/xo-security/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/xo-security/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18542",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The zendesk-help-center plugin before 1.0.5 for WordPress has multiple XSS issues."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/zendesk-help-center/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/zendesk-help-center/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18543",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The invite-anyone plugin before 1.3.16 for WordPress has incorrect access control for email-based invitations."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/invite-anyone/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/invite-anyone/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18544",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The invite-anyone plugin before 1.3.16 for WordPress has admin-panel CSRF."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/invite-anyone/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/invite-anyone/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18545",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The invite-anyone plugin before 1.3.16 for WordPress has incorrect escaping of untrusted Dashboard and front-end input."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/invite-anyone/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/invite-anyone/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18546",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The jayj-quicktag plugin before 1.3.2 for WordPress has CSRF."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/jayj-quicktag/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/jayj-quicktag/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2017-18547",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The nelio-ab-testing plugin before 4.6.4 for WordPress has CSRF in experiment forms."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/nelio-ab-testing/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/nelio-ab-testing/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-20971",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The church-admin plugin before 1.2550 for WordPress has CSRF affecting the upload of a bible reading plan."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/church-admin/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/church-admin/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-20972",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The companion-auto-update plugin before 3.2.1 for WordPress has CSRF."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/companion-auto-update/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/companion-auto-update/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-20973",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The companion-auto-update plugin before 3.2.1 for WordPress has local file inclusion."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/companion-auto-update/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/companion-auto-update/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-20974",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The js-jobs plugin before 1.0.7 for WordPress has CSRF."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/js-jobs/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/js-jobs/#developers"
}
]
}
}

View File

@ -86,6 +86,11 @@
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/154022/VxWorks-6.8-Integer-Underflow.html",
"url": "http://packetstormsecurity.com/files/154022/VxWorks-6.8-Integer-Underflow.html"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K41190253",
"url": "https://support.f5.com/csp/article/K41190253"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "CONFIRM",
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12256",
"url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12256"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K41190253",
"url": "https://support.f5.com/csp/article/K41190253"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "CONFIRM",
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12257",
"url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12257"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K41190253",
"url": "https://support.f5.com/csp/article/K41190253"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "MISC",
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12258",
"url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12258"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K41190253",
"url": "https://support.f5.com/csp/article/K41190253"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "CONFIRM",
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12259",
"url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12259"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K41190253",
"url": "https://support.f5.com/csp/article/K41190253"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "MISC",
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12260",
"url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12260"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K41190253",
"url": "https://support.f5.com/csp/article/K41190253"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "MISC",
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12261",
"url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12261"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K41190253",
"url": "https://support.f5.com/csp/article/K41190253"
}
]
}

View File

@ -56,6 +56,11 @@
"refsource": "CONFIRM",
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12262",
"url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12262"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K41190253",
"url": "https://support.f5.com/csp/article/K41190253"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "CONFIRM",
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12263",
"url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12263"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K41190253",
"url": "https://support.f5.com/csp/article/K41190253"
}
]
}

View File

@ -61,6 +61,11 @@
"refsource": "CONFIRM",
"name": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/",
"url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K41190253",
"url": "https://support.f5.com/csp/article/K41190253"
}
]
}

View File

@ -81,6 +81,11 @@
"refsource": "CONFIRM",
"name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12265",
"url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12265"
},
{
"refsource": "CONFIRM",
"name": "https://support.f5.com/csp/article/K41190253",
"url": "https://support.f5.com/csp/article/K41190253"
}
]
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15113",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The companion-sitemap-generator plugin before 3.7.0 for WordPress has CSRF."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/companion-sitemap-generator/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/companion-sitemap-generator/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15114",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The formcraft-form-builder plugin before 1.2.2 for WordPress has CSRF."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/formcraft-form-builder/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/formcraft-form-builder/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15115",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The peters-login-redirect plugin before 2.9.2 for WordPress has CSRF."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/peters-login-redirect/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/peters-login-redirect/#developers"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-15116",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The easy-digital-downloads plugin before 2.9.16 for WordPress has XSS related to IP address logging."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/easy-digital-downloads/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/easy-digital-downloads/#developers"
}
]
}
}