From 3c474825dacce46974c0e39b90e8ff29c6e7c41f Mon Sep 17 00:00:00 2001 From: CVE Team Date: Fri, 16 Aug 2019 21:00:46 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2014/10xxx/CVE-2014-10376.json | 62 ++++++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9322.json | 62 ++++++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9323.json | 62 ++++++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9324.json | 62 ++++++++++++++++++++++++++++++++++ 2017/18xxx/CVE-2017-18541.json | 62 ++++++++++++++++++++++++++++++++++ 2017/18xxx/CVE-2017-18542.json | 62 ++++++++++++++++++++++++++++++++++ 2017/18xxx/CVE-2017-18543.json | 62 ++++++++++++++++++++++++++++++++++ 2017/18xxx/CVE-2017-18544.json | 62 ++++++++++++++++++++++++++++++++++ 2017/18xxx/CVE-2017-18545.json | 62 ++++++++++++++++++++++++++++++++++ 2017/18xxx/CVE-2017-18546.json | 62 ++++++++++++++++++++++++++++++++++ 2017/18xxx/CVE-2017-18547.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20971.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20972.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20973.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20974.json | 62 ++++++++++++++++++++++++++++++++++ 2019/12xxx/CVE-2019-12255.json | 5 +++ 2019/12xxx/CVE-2019-12256.json | 5 +++ 2019/12xxx/CVE-2019-12257.json | 5 +++ 2019/12xxx/CVE-2019-12258.json | 5 +++ 2019/12xxx/CVE-2019-12259.json | 5 +++ 2019/12xxx/CVE-2019-12260.json | 5 +++ 2019/12xxx/CVE-2019-12261.json | 5 +++ 2019/12xxx/CVE-2019-12262.json | 5 +++ 2019/12xxx/CVE-2019-12263.json | 5 +++ 2019/12xxx/CVE-2019-12264.json | 5 +++ 2019/12xxx/CVE-2019-12265.json | 5 +++ 2019/15xxx/CVE-2019-15113.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15114.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15115.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15116.json | 62 ++++++++++++++++++++++++++++++++++ 30 files changed, 1233 insertions(+) create mode 100644 2014/10xxx/CVE-2014-10376.json create mode 100644 2015/9xxx/CVE-2015-9322.json create mode 100644 2015/9xxx/CVE-2015-9323.json create mode 100644 2015/9xxx/CVE-2015-9324.json create mode 100644 2017/18xxx/CVE-2017-18541.json create mode 100644 2017/18xxx/CVE-2017-18542.json create mode 100644 2017/18xxx/CVE-2017-18543.json create mode 100644 2017/18xxx/CVE-2017-18544.json create mode 100644 2017/18xxx/CVE-2017-18545.json create mode 100644 2017/18xxx/CVE-2017-18546.json create mode 100644 2017/18xxx/CVE-2017-18547.json create mode 100644 2018/20xxx/CVE-2018-20971.json create mode 100644 2018/20xxx/CVE-2018-20972.json create mode 100644 2018/20xxx/CVE-2018-20973.json create mode 100644 2018/20xxx/CVE-2018-20974.json create mode 100644 2019/15xxx/CVE-2019-15113.json create mode 100644 2019/15xxx/CVE-2019-15114.json create mode 100644 2019/15xxx/CVE-2019-15115.json create mode 100644 2019/15xxx/CVE-2019-15116.json diff --git a/2014/10xxx/CVE-2014-10376.json b/2014/10xxx/CVE-2014-10376.json new file mode 100644 index 00000000000..1eefdc14c4e --- /dev/null +++ b/2014/10xxx/CVE-2014-10376.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2014-10376", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The i-recommend-this plugin before 3.7.3 for WordPress has SQL injection." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/i-recommend-this/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/i-recommend-this/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9322.json b/2015/9xxx/CVE-2015-9322.json new file mode 100644 index 00000000000..c0e96ea337a --- /dev/null +++ b/2015/9xxx/CVE-2015-9322.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9322", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The erident-custom-login-and-dashboard plugin before 3.5 for WordPress has CSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/erident-custom-login-and-dashboard/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/erident-custom-login-and-dashboard/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9323.json b/2015/9xxx/CVE-2015-9323.json new file mode 100644 index 00000000000..59018f2e9dd --- /dev/null +++ b/2015/9xxx/CVE-2015-9323.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9323", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The 404-to-301 plugin before 2.0.3 for WordPress has SQL injection." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/404-to-301/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/404-to-301/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9324.json b/2015/9xxx/CVE-2015-9324.json new file mode 100644 index 00000000000..f72c19b2eb5 --- /dev/null +++ b/2015/9xxx/CVE-2015-9324.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9324", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The easy-digital-downloads plugin before 2.3.3 for WordPress has SQL injection." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/easy-digital-downloads/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/easy-digital-downloads/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18541.json b/2017/18xxx/CVE-2017-18541.json new file mode 100644 index 00000000000..f09613b68e2 --- /dev/null +++ b/2017/18xxx/CVE-2017-18541.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18541", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The xo-security plugin before 1.5.3 for WordPress has XSS." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/xo-security/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/xo-security/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18542.json b/2017/18xxx/CVE-2017-18542.json new file mode 100644 index 00000000000..fa7ff6838b0 --- /dev/null +++ b/2017/18xxx/CVE-2017-18542.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18542", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The zendesk-help-center plugin before 1.0.5 for WordPress has multiple XSS issues." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/zendesk-help-center/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/zendesk-help-center/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18543.json b/2017/18xxx/CVE-2017-18543.json new file mode 100644 index 00000000000..7cf93e17738 --- /dev/null +++ b/2017/18xxx/CVE-2017-18543.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18543", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The invite-anyone plugin before 1.3.16 for WordPress has incorrect access control for email-based invitations." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/invite-anyone/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/invite-anyone/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18544.json b/2017/18xxx/CVE-2017-18544.json new file mode 100644 index 00000000000..e252ab8ebc2 --- /dev/null +++ b/2017/18xxx/CVE-2017-18544.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18544", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The invite-anyone plugin before 1.3.16 for WordPress has admin-panel CSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/invite-anyone/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/invite-anyone/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18545.json b/2017/18xxx/CVE-2017-18545.json new file mode 100644 index 00000000000..c47a7d9ecb7 --- /dev/null +++ b/2017/18xxx/CVE-2017-18545.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18545", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The invite-anyone plugin before 1.3.16 for WordPress has incorrect escaping of untrusted Dashboard and front-end input." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/invite-anyone/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/invite-anyone/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18546.json b/2017/18xxx/CVE-2017-18546.json new file mode 100644 index 00000000000..a3fb07205e3 --- /dev/null +++ b/2017/18xxx/CVE-2017-18546.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18546", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The jayj-quicktag plugin before 1.3.2 for WordPress has CSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/jayj-quicktag/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/jayj-quicktag/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2017/18xxx/CVE-2017-18547.json b/2017/18xxx/CVE-2017-18547.json new file mode 100644 index 00000000000..a2c5fa776cd --- /dev/null +++ b/2017/18xxx/CVE-2017-18547.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2017-18547", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The nelio-ab-testing plugin before 4.6.4 for WordPress has CSRF in experiment forms." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/nelio-ab-testing/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/nelio-ab-testing/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20971.json b/2018/20xxx/CVE-2018-20971.json new file mode 100644 index 00000000000..99ac8541043 --- /dev/null +++ b/2018/20xxx/CVE-2018-20971.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20971", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The church-admin plugin before 1.2550 for WordPress has CSRF affecting the upload of a bible reading plan." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/church-admin/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/church-admin/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20972.json b/2018/20xxx/CVE-2018-20972.json new file mode 100644 index 00000000000..1ff8e895cc3 --- /dev/null +++ b/2018/20xxx/CVE-2018-20972.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20972", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The companion-auto-update plugin before 3.2.1 for WordPress has CSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/companion-auto-update/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/companion-auto-update/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20973.json b/2018/20xxx/CVE-2018-20973.json new file mode 100644 index 00000000000..21de1c23f4b --- /dev/null +++ b/2018/20xxx/CVE-2018-20973.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20973", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The companion-auto-update plugin before 3.2.1 for WordPress has local file inclusion." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/companion-auto-update/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/companion-auto-update/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20974.json b/2018/20xxx/CVE-2018-20974.json new file mode 100644 index 00000000000..6f93acb0427 --- /dev/null +++ b/2018/20xxx/CVE-2018-20974.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20974", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The js-jobs plugin before 1.0.7 for WordPress has CSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/js-jobs/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/js-jobs/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12255.json b/2019/12xxx/CVE-2019-12255.json index 313dc2ff09b..b53e66a4c6b 100644 --- a/2019/12xxx/CVE-2019-12255.json +++ b/2019/12xxx/CVE-2019-12255.json @@ -86,6 +86,11 @@ "refsource": "MISC", "name": "http://packetstormsecurity.com/files/154022/VxWorks-6.8-Integer-Underflow.html", "url": "http://packetstormsecurity.com/files/154022/VxWorks-6.8-Integer-Underflow.html" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K41190253", + "url": "https://support.f5.com/csp/article/K41190253" } ] } diff --git a/2019/12xxx/CVE-2019-12256.json b/2019/12xxx/CVE-2019-12256.json index 4a1bf10e3e9..fb841d12578 100644 --- a/2019/12xxx/CVE-2019-12256.json +++ b/2019/12xxx/CVE-2019-12256.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12256", "url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12256" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K41190253", + "url": "https://support.f5.com/csp/article/K41190253" } ] } diff --git a/2019/12xxx/CVE-2019-12257.json b/2019/12xxx/CVE-2019-12257.json index 678a34b2663..d0ca73db85a 100644 --- a/2019/12xxx/CVE-2019-12257.json +++ b/2019/12xxx/CVE-2019-12257.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12257", "url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12257" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K41190253", + "url": "https://support.f5.com/csp/article/K41190253" } ] } diff --git a/2019/12xxx/CVE-2019-12258.json b/2019/12xxx/CVE-2019-12258.json index 414fd99d3ee..c6a2b83e0e6 100644 --- a/2019/12xxx/CVE-2019-12258.json +++ b/2019/12xxx/CVE-2019-12258.json @@ -81,6 +81,11 @@ "refsource": "MISC", "name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12258", "url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12258" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K41190253", + "url": "https://support.f5.com/csp/article/K41190253" } ] } diff --git a/2019/12xxx/CVE-2019-12259.json b/2019/12xxx/CVE-2019-12259.json index eff7c2803f2..449e235ed89 100644 --- a/2019/12xxx/CVE-2019-12259.json +++ b/2019/12xxx/CVE-2019-12259.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12259", "url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12259" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K41190253", + "url": "https://support.f5.com/csp/article/K41190253" } ] } diff --git a/2019/12xxx/CVE-2019-12260.json b/2019/12xxx/CVE-2019-12260.json index b2dc1d503b4..ed309dfc8a2 100644 --- a/2019/12xxx/CVE-2019-12260.json +++ b/2019/12xxx/CVE-2019-12260.json @@ -81,6 +81,11 @@ "refsource": "MISC", "name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12260", "url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12260" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K41190253", + "url": "https://support.f5.com/csp/article/K41190253" } ] } diff --git a/2019/12xxx/CVE-2019-12261.json b/2019/12xxx/CVE-2019-12261.json index 86f066c2e94..9a2e36d58eb 100644 --- a/2019/12xxx/CVE-2019-12261.json +++ b/2019/12xxx/CVE-2019-12261.json @@ -81,6 +81,11 @@ "refsource": "MISC", "name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12261", "url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12261" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K41190253", + "url": "https://support.f5.com/csp/article/K41190253" } ] } diff --git a/2019/12xxx/CVE-2019-12262.json b/2019/12xxx/CVE-2019-12262.json index 8bf20f352c4..cc68a5a1bab 100644 --- a/2019/12xxx/CVE-2019-12262.json +++ b/2019/12xxx/CVE-2019-12262.json @@ -56,6 +56,11 @@ "refsource": "CONFIRM", "name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12262", "url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12262" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K41190253", + "url": "https://support.f5.com/csp/article/K41190253" } ] } diff --git a/2019/12xxx/CVE-2019-12263.json b/2019/12xxx/CVE-2019-12263.json index 04d610f7415..b3fc1d94691 100644 --- a/2019/12xxx/CVE-2019-12263.json +++ b/2019/12xxx/CVE-2019-12263.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12263", "url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12263" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K41190253", + "url": "https://support.f5.com/csp/article/K41190253" } ] } diff --git a/2019/12xxx/CVE-2019-12264.json b/2019/12xxx/CVE-2019-12264.json index 27ee1843548..dabf1e70485 100644 --- a/2019/12xxx/CVE-2019-12264.json +++ b/2019/12xxx/CVE-2019-12264.json @@ -61,6 +61,11 @@ "refsource": "CONFIRM", "name": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/", "url": "https://www.windriver.com/security/announcements/tcp-ip-network-stack-ipnet-urgent11/" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K41190253", + "url": "https://support.f5.com/csp/article/K41190253" } ] } diff --git a/2019/12xxx/CVE-2019-12265.json b/2019/12xxx/CVE-2019-12265.json index 85259754276..1a514f28717 100644 --- a/2019/12xxx/CVE-2019-12265.json +++ b/2019/12xxx/CVE-2019-12265.json @@ -81,6 +81,11 @@ "refsource": "CONFIRM", "name": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12265", "url": "https://support2.windriver.com/index.php?page=cve&on=view&id=CVE-2019-12265" + }, + { + "refsource": "CONFIRM", + "name": "https://support.f5.com/csp/article/K41190253", + "url": "https://support.f5.com/csp/article/K41190253" } ] } diff --git a/2019/15xxx/CVE-2019-15113.json b/2019/15xxx/CVE-2019-15113.json new file mode 100644 index 00000000000..32b0144d7c3 --- /dev/null +++ b/2019/15xxx/CVE-2019-15113.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15113", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The companion-sitemap-generator plugin before 3.7.0 for WordPress has CSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/companion-sitemap-generator/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/companion-sitemap-generator/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15114.json b/2019/15xxx/CVE-2019-15114.json new file mode 100644 index 00000000000..c2608e88545 --- /dev/null +++ b/2019/15xxx/CVE-2019-15114.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15114", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The formcraft-form-builder plugin before 1.2.2 for WordPress has CSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/formcraft-form-builder/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/formcraft-form-builder/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15115.json b/2019/15xxx/CVE-2019-15115.json new file mode 100644 index 00000000000..75d4a0d7c27 --- /dev/null +++ b/2019/15xxx/CVE-2019-15115.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15115", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The peters-login-redirect plugin before 2.9.2 for WordPress has CSRF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/peters-login-redirect/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/peters-login-redirect/#developers" + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15116.json b/2019/15xxx/CVE-2019-15116.json new file mode 100644 index 00000000000..f79bed6543b --- /dev/null +++ b/2019/15xxx/CVE-2019-15116.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15116", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The easy-digital-downloads plugin before 2.9.16 for WordPress has XSS related to IP address logging." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/easy-digital-downloads/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/easy-digital-downloads/#developers" + } + ] + } +} \ No newline at end of file