diff --git a/2018/20xxx/CVE-2018-20597.json b/2018/20xxx/CVE-2018-20597.json new file mode 100644 index 00000000000..8bde9495833 --- /dev/null +++ b/2018/20xxx/CVE-2018-20597.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20597", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "UCMS 1.4.7 has XSS via the dir parameter in an index.php sadmin_fileedit action." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#xss1", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#xss1" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20598.json b/2018/20xxx/CVE-2018-20598.json new file mode 100644 index 00000000000..aec671cbc6d --- /dev/null +++ b/2018/20xxx/CVE-2018-20598.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20598", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "UCMS 1.4.7 has ?do=user_addpost CSRF." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#csrf", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#csrf" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20599.json b/2018/20xxx/CVE-2018-20599.json new file mode 100644 index 00000000000..854e542a382 --- /dev/null +++ b/2018/20xxx/CVE-2018-20599.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20599", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "UCMS 1.4.7 allows remote attackers to execute arbitrary PHP code by entering this code during an index.php sadmin_fileedit action." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#getshell", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#getshell" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20600.json b/2018/20xxx/CVE-2018-20600.json new file mode 100644 index 00000000000..9dba5d0bbee --- /dev/null +++ b/2018/20xxx/CVE-2018-20600.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20600", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "sadmin\\cedit.php in UCMS 1.4.7 has XSS via an index.php sadmin_cedit action." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#xss2", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#xss2" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20601.json b/2018/20xxx/CVE-2018-20601.json new file mode 100644 index 00000000000..909f3b3033e --- /dev/null +++ b/2018/20xxx/CVE-2018-20601.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20601", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "UCMS 1.4.7 has XSS via the description parameter in an index.php list_editpost action." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#xss3", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/ucms.md#xss3" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20602.json b/2018/20xxx/CVE-2018-20602.json new file mode 100644 index 00000000000..063e5671def --- /dev/null +++ b/2018/20xxx/CVE-2018-20602.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20602", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Lei Feng TV CMS (aka LFCMS) 3.8.6 allows full path disclosure via the /install.php?s=/1 URI." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/lfdycms.md#information_disclosure", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/lfdycms.md#information_disclosure" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20603.json b/2018/20xxx/CVE-2018-20603.json new file mode 100644 index 00000000000..4f83cf018d5 --- /dev/null +++ b/2018/20xxx/CVE-2018-20603.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20603", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Lei Feng TV CMS (aka LFCMS) 3.8.6 allows admin.php?s=/Member/add.html CSRF." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/lfdycms.md#csrf", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/lfdycms.md#csrf" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20604.json b/2018/20xxx/CVE-2018-20604.json new file mode 100644 index 00000000000..5e047d3e866 --- /dev/null +++ b/2018/20xxx/CVE-2018-20604.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20604", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Lei Feng TV CMS (aka LFCMS) 3.8.6 allows Directory Traversal via crafted use of ..* in Template/edit/path URIs, as demonstrated by the admin.php?s=/Template/edit/path/*web*..*..*..*..*1.txt.html URI to read the 1.txt file." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/lfdycms.md#directory-traversal", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/lfdycms.md#directory-traversal" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20605.json b/2018/20xxx/CVE-2018-20605.json new file mode 100644 index 00000000000..df812f0f810 --- /dev/null +++ b/2018/20xxx/CVE-2018-20605.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20605", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "imcat 4.4 allows remote attackers to execute arbitrary PHP code by using root/run/adm.php to modify the boot/bootskip.php file." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/imcat.md#getshell", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/imcat.md#getshell" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20606.json b/2018/20xxx/CVE-2018-20606.json new file mode 100644 index 00000000000..ea81d06d3a4 --- /dev/null +++ b/2018/20xxx/CVE-2018-20606.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20606", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "imcat 4.4 allows full path disclosure via a dev.php?tools-ipaddr&api=Pcoln&uip= URI." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/imcat.md#information-disclosure4", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/imcat.md#information-disclosure4" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20607.json b/2018/20xxx/CVE-2018-20607.json new file mode 100644 index 00000000000..65dce9e6320 --- /dev/null +++ b/2018/20xxx/CVE-2018-20607.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20607", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "imcat 4.4 allows remote attackers to obtain potentially sensitive debugging information via the root/tools/adbug/binfo.php URI." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/imcat.md#information-disclosure2", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/imcat.md#information-disclosure2" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20608.json b/2018/20xxx/CVE-2018-20608.json new file mode 100644 index 00000000000..2737536fa1f --- /dev/null +++ b/2018/20xxx/CVE-2018-20608.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20608", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "imcat 4.4 allows remote attackers to read phpinfo output via the root/tools/adbug/binfo.php?phpinfo1 URI." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/imcat.md#information-disclosure", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/imcat.md#information-disclosure" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20609.json b/2018/20xxx/CVE-2018-20609.json new file mode 100644 index 00000000000..0015b73ac12 --- /dev/null +++ b/2018/20xxx/CVE-2018-20609.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20609", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "imcat 4.4 allows remote attackers to obtain potentially sensitive configuration information via the root/tools/adbug/check.php URI." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/imcat.md#information-disclosure2", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/imcat.md#information-disclosure2" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20610.json b/2018/20xxx/CVE-2018-20610.json new file mode 100644 index 00000000000..aaa84d93615 --- /dev/null +++ b/2018/20xxx/CVE-2018-20610.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20610", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "imcat 4.4 allows directory traversal via the root/run/adm.php efile parameter." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/imcat.md#directory-traversal", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/imcat.md#directory-traversal" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20611.json b/2018/20xxx/CVE-2018-20611.json new file mode 100644 index 00000000000..ec967ee858f --- /dev/null +++ b/2018/20xxx/CVE-2018-20611.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20611", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "imcat 4.4 allow XSS via a crafted cookie to the root/tools/adbug/binfo.php?cookie URI." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/imcat.md#xss", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/imcat.md#xss" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20612.json b/2018/20xxx/CVE-2018-20612.json new file mode 100644 index 00000000000..c4b22a323ba --- /dev/null +++ b/2018/20xxx/CVE-2018-20612.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20612", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "UWA 2.3.11 allows index.php?g=admin&c=admin&a=add_admin_do CSRF." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/UWA.md", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/UWA.md" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20613.json b/2018/20xxx/CVE-2018-20613.json new file mode 100644 index 00000000000..70278cba688 --- /dev/null +++ b/2018/20xxx/CVE-2018-20613.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20613", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "TEMMOKU T1.09 Beta allows admin/user/add CSRF." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/temmoku.md", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/temmoku.md" + } + ] + } +} diff --git a/2018/20xxx/CVE-2018-20614.json b/2018/20xxx/CVE-2018-20614.json new file mode 100644 index 00000000000..51753028527 --- /dev/null +++ b/2018/20xxx/CVE-2018-20614.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-20614", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "public\\install\\install.php in CIM 0.9.3 allows remote attackers to reload the product via the public/install/#/step3 URI." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/AvaterXXX/CVEs/blob/master/cim.md#reload-application", + "refsource" : "MISC", + "url" : "https://github.com/AvaterXXX/CVEs/blob/master/cim.md#reload-application" + } + ] + } +}