From 77704296f6899ccb5afb27908738d2709972a152 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 1 Aug 2019 16:00:50 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2016/10xxx/CVE-2016-10836.json | 62 ++++++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10837.json | 62 ++++++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10838.json | 62 ++++++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10839.json | 62 ++++++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10840.json | 62 ++++++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10841.json | 62 ++++++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10842.json | 62 ++++++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10843.json | 62 ++++++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10844.json | 62 ++++++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10845.json | 62 ++++++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10846.json | 62 ++++++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10847.json | 62 ++++++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10848.json | 62 ++++++++++++++++++++++++++++++++++ 2016/10xxx/CVE-2016-10849.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20924.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20925.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20926.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20927.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20928.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20929.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20930.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20931.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20932.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20933.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20934.json | 62 ++++++++++++++++++++++++++++++++++ 2018/20xxx/CVE-2018-20935.json | 62 ++++++++++++++++++++++++++++++++++ 2019/14xxx/CVE-2019-14452.json | 5 +++ 2019/14xxx/CVE-2019-14486.json | 62 ++++++++++++++++++++++++++++++++++ 28 files changed, 1679 insertions(+) create mode 100644 2016/10xxx/CVE-2016-10836.json create mode 100644 2016/10xxx/CVE-2016-10837.json create mode 100644 2016/10xxx/CVE-2016-10838.json create mode 100644 2016/10xxx/CVE-2016-10839.json create mode 100644 2016/10xxx/CVE-2016-10840.json create mode 100644 2016/10xxx/CVE-2016-10841.json create mode 100644 2016/10xxx/CVE-2016-10842.json create mode 100644 2016/10xxx/CVE-2016-10843.json create mode 100644 2016/10xxx/CVE-2016-10844.json create mode 100644 2016/10xxx/CVE-2016-10845.json create mode 100644 2016/10xxx/CVE-2016-10846.json create mode 100644 2016/10xxx/CVE-2016-10847.json create mode 100644 2016/10xxx/CVE-2016-10848.json create mode 100644 2016/10xxx/CVE-2016-10849.json create mode 100644 2018/20xxx/CVE-2018-20924.json create mode 100644 2018/20xxx/CVE-2018-20925.json create mode 100644 2018/20xxx/CVE-2018-20926.json create mode 100644 2018/20xxx/CVE-2018-20927.json create mode 100644 2018/20xxx/CVE-2018-20928.json create mode 100644 2018/20xxx/CVE-2018-20929.json create mode 100644 2018/20xxx/CVE-2018-20930.json create mode 100644 2018/20xxx/CVE-2018-20931.json create mode 100644 2018/20xxx/CVE-2018-20932.json create mode 100644 2018/20xxx/CVE-2018-20933.json create mode 100644 2018/20xxx/CVE-2018-20934.json create mode 100644 2018/20xxx/CVE-2018-20935.json create mode 100644 2019/14xxx/CVE-2019-14486.json diff --git a/2016/10xxx/CVE-2016-10836.json b/2016/10xxx/CVE-2016-10836.json new file mode 100644 index 00000000000..ad8c2261319 --- /dev/null +++ b/2016/10xxx/CVE-2016-10836.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10836", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 55.9999.141 allows arbitrary file-read operations during authentication with caldav (SEC-108)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://documentation.cpanel.net/display/CL/56+Change+Log", + "refsource": "MISC", + "name": "https://documentation.cpanel.net/display/CL/56+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10837.json b/2016/10xxx/CVE-2016-10837.json new file mode 100644 index 00000000000..bd27beb0890 --- /dev/null +++ b/2016/10xxx/CVE-2016-10837.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10837", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 11.54.0.4 allows arbitrary code execution because of an unsafe @INC path (SEC-46)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://documentation.cpanel.net/display/CL/54+Change+Log", + "refsource": "MISC", + "name": "https://documentation.cpanel.net/display/CL/54+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10838.json b/2016/10xxx/CVE-2016-10838.json new file mode 100644 index 00000000000..c30991ca413 --- /dev/null +++ b/2016/10xxx/CVE-2016-10838.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10838", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 11.54.0.4 allows arbitrary file-read operations via the bin/fmq script (SEC-70)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://documentation.cpanel.net/display/CL/54+Change+Log", + "refsource": "MISC", + "name": "https://documentation.cpanel.net/display/CL/54+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10839.json b/2016/10xxx/CVE-2016-10839.json new file mode 100644 index 00000000000..1c7790f18d1 --- /dev/null +++ b/2016/10xxx/CVE-2016-10839.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10839", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 11.54.0.4 allows SQL injection in bin/horde_update_usernames (SEC-71)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://documentation.cpanel.net/display/CL/54+Change+Log", + "refsource": "MISC", + "name": "https://documentation.cpanel.net/display/CL/54+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10840.json b/2016/10xxx/CVE-2016-10840.json new file mode 100644 index 00000000000..5fd92382222 --- /dev/null +++ b/2016/10xxx/CVE-2016-10840.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10840", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 11.54.0.4 allows arbitrary code execution during locale duplication (SEC-72)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://documentation.cpanel.net/display/CL/54+Change+Log", + "refsource": "MISC", + "name": "https://documentation.cpanel.net/display/CL/54+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10841.json b/2016/10xxx/CVE-2016-10841.json new file mode 100644 index 00000000000..a526ec7ac3c --- /dev/null +++ b/2016/10xxx/CVE-2016-10841.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10841", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The bin/mkvhostspasswd script in cPanel before 11.54.0.4 discloses password hashes (SEC-73)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://documentation.cpanel.net/display/CL/54+Change+Log", + "refsource": "MISC", + "name": "https://documentation.cpanel.net/display/CL/54+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10842.json b/2016/10xxx/CVE-2016-10842.json new file mode 100644 index 00000000000..1672acf43f7 --- /dev/null +++ b/2016/10xxx/CVE-2016-10842.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10842", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 11.54.0.4 allows certain file-read operations in bin/setup_global_spam_filter.pl (SEC-74)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://documentation.cpanel.net/display/CL/54+Change+Log", + "refsource": "MISC", + "name": "https://documentation.cpanel.net/display/CL/54+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10843.json b/2016/10xxx/CVE-2016-10843.json new file mode 100644 index 00000000000..db76a254b81 --- /dev/null +++ b/2016/10xxx/CVE-2016-10843.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10843", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 11.54.0.4 allows code execution in the context of shared users via JSON-API (SEC-76)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://documentation.cpanel.net/display/CL/54+Change+Log", + "refsource": "MISC", + "name": "https://documentation.cpanel.net/display/CL/54+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10844.json b/2016/10xxx/CVE-2016-10844.json new file mode 100644 index 00000000000..86a13220d36 --- /dev/null +++ b/2016/10xxx/CVE-2016-10844.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10844", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The chcpass script in cPanel before 11.54.0.4 reveals a password hash (SEC-77)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://documentation.cpanel.net/display/CL/54+Change+Log", + "refsource": "MISC", + "name": "https://documentation.cpanel.net/display/CL/54+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10845.json b/2016/10xxx/CVE-2016-10845.json new file mode 100644 index 00000000000..f11a3773a78 --- /dev/null +++ b/2016/10xxx/CVE-2016-10845.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10845", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 11.54.0.4 allows arbitrary file-overwrite operations in scripts/check_system_storable (SEC-78)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://documentation.cpanel.net/display/CL/54+Change+Log", + "refsource": "MISC", + "name": "https://documentation.cpanel.net/display/CL/54+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10846.json b/2016/10xxx/CVE-2016-10846.json new file mode 100644 index 00000000000..da9086ad26e --- /dev/null +++ b/2016/10xxx/CVE-2016-10846.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10846", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 11.54.0.4 allows arbitrary file-chown and file-chmod operations during Roundcube database conversions (SEC-79)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://documentation.cpanel.net/display/CL/54+Change+Log", + "refsource": "MISC", + "name": "https://documentation.cpanel.net/display/CL/54+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10847.json b/2016/10xxx/CVE-2016-10847.json new file mode 100644 index 00000000000..9e9f7a064e8 --- /dev/null +++ b/2016/10xxx/CVE-2016-10847.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10847", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 11.54.0.4 allows arbitrary file-read and file-write operations via scripts/fixmailboxpath (SEC-80)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://documentation.cpanel.net/display/CL/54+Change+Log", + "refsource": "MISC", + "name": "https://documentation.cpanel.net/display/CL/54+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10848.json b/2016/10xxx/CVE-2016-10848.json new file mode 100644 index 00000000000..b673f7567bb --- /dev/null +++ b/2016/10xxx/CVE-2016-10848.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10848", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 11.54.0.4 allows arbitrary file-overwrite operations in scripts/quotacheck (SEC-81)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://documentation.cpanel.net/display/CL/54+Change+Log", + "refsource": "MISC", + "name": "https://documentation.cpanel.net/display/CL/54+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2016/10xxx/CVE-2016-10849.json b/2016/10xxx/CVE-2016-10849.json new file mode 100644 index 00000000000..541779446d5 --- /dev/null +++ b/2016/10xxx/CVE-2016-10849.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2016-10849", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 11.54.0.4 allows certain file-chmod operations in scripts/secureit (SEC-82)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://documentation.cpanel.net/display/CL/54+Change+Log", + "refsource": "MISC", + "name": "https://documentation.cpanel.net/display/CL/54+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20924.json b/2018/20xxx/CVE-2018-20924.json new file mode 100644 index 00000000000..1be215a2680 --- /dev/null +++ b/2018/20xxx/CVE-2018-20924.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20924", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 70.0.23 allows arbitrary file-read and file-unlink operations via WHM style uploads (SEC-378)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://documentation.cpanel.net/display/CL/70+Change+Log", + "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20925.json b/2018/20xxx/CVE-2018-20925.json new file mode 100644 index 00000000000..6e90937b011 --- /dev/null +++ b/2018/20xxx/CVE-2018-20925.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20925", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 70.0.23 allows local privilege escalation via the WHM Legacy Language File Upload interface (SEC-379)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://documentation.cpanel.net/display/CL/70+Change+Log", + "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20926.json b/2018/20xxx/CVE-2018-20926.json new file mode 100644 index 00000000000..ef049bca630 --- /dev/null +++ b/2018/20xxx/CVE-2018-20926.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20926", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 70.0.23 allows local privilege escalation via the WHM Locale XML Upload interface (SEC-380)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://documentation.cpanel.net/display/CL/70+Change+Log", + "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20927.json b/2018/20xxx/CVE-2018-20927.json new file mode 100644 index 00000000000..530c6b774f8 --- /dev/null +++ b/2018/20xxx/CVE-2018-20927.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20927", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 70.0.23 allows jailshell escape because of incorrect crontab parsing (SEC-382)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://documentation.cpanel.net/display/CL/70+Change+Log", + "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20928.json b/2018/20xxx/CVE-2018-20928.json new file mode 100644 index 00000000000..2352110cbc1 --- /dev/null +++ b/2018/20xxx/CVE-2018-20928.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20928", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 70.0.23 allows stored XSS via the cpaddons vendor interface (SEC-391)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://documentation.cpanel.net/display/CL/70+Change+Log", + "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20929.json b/2018/20xxx/CVE-2018-20929.json new file mode 100644 index 00000000000..7530158b2fd --- /dev/null +++ b/2018/20xxx/CVE-2018-20929.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20929", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 70.0.23 allows an open redirect via the /unprotected/redirect.html endpoint (SEC-392)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://documentation.cpanel.net/display/CL/70+Change+Log", + "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20930.json b/2018/20xxx/CVE-2018-20930.json new file mode 100644 index 00000000000..7efb91f8de2 --- /dev/null +++ b/2018/20xxx/CVE-2018-20930.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20930", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 70.0.23 allows .htaccess restrictions bypass when Htaccess Optimization is enabled (SEC-401)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://documentation.cpanel.net/display/CL/70+Change+Log", + "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20931.json b/2018/20xxx/CVE-2018-20931.json new file mode 100644 index 00000000000..e8b46656461 --- /dev/null +++ b/2018/20xxx/CVE-2018-20931.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20931", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 70.0.23 allows demo accounts to execute code via the Landing Page (SEC-405)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://documentation.cpanel.net/display/CL/70+Change+Log", + "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20932.json b/2018/20xxx/CVE-2018-20932.json new file mode 100644 index 00000000000..56c25301164 --- /dev/null +++ b/2018/20xxx/CVE-2018-20932.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20932", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 70.0.23 exposes Apache HTTP Server logs after creation of certain domains (SEC-406)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://documentation.cpanel.net/display/CL/70+Change+Log", + "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20933.json b/2018/20xxx/CVE-2018-20933.json new file mode 100644 index 00000000000..9f2837d15f9 --- /dev/null +++ b/2018/20xxx/CVE-2018-20933.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20933", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 70.0.23 has Stored XSS via an WHM Edit DNS Zone action (SEC-410)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://documentation.cpanel.net/display/CL/70+Change+Log", + "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20934.json b/2018/20xxx/CVE-2018-20934.json new file mode 100644 index 00000000000..6742c661922 --- /dev/null +++ b/2018/20xxx/CVE-2018-20934.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20934", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 70.0.23 does not prevent e-mail account suspensions from being applied to unowned accounts (SEC-411)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://documentation.cpanel.net/display/CL/70+Change+Log", + "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2018/20xxx/CVE-2018-20935.json b/2018/20xxx/CVE-2018-20935.json new file mode 100644 index 00000000000..eab2b952593 --- /dev/null +++ b/2018/20xxx/CVE-2018-20935.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2018-20935", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "cPanel before 70.0.23 allows stored XSS in via a WHM \"Reset a DNS Zone\" action (SEC-412)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://documentation.cpanel.net/display/CL/70+Change+Log", + "url": "https://documentation.cpanel.net/display/CL/70+Change+Log" + } + ] + } +} \ No newline at end of file diff --git a/2019/14xxx/CVE-2019-14452.json b/2019/14xxx/CVE-2019-14452.json index c89421c03c4..4ba93935d34 100644 --- a/2019/14xxx/CVE-2019-14452.json +++ b/2019/14xxx/CVE-2019-14452.json @@ -86,6 +86,11 @@ "url": "https://github.com/Sigil-Ebook/Sigil/compare/ea7f27d...5b867e5", "refsource": "MISC", "name": "https://github.com/Sigil-Ebook/Sigil/compare/ea7f27d...5b867e5" + }, + { + "refsource": "UBUNTU", + "name": "USN-4085-1", + "url": "https://usn.ubuntu.com/4085-1/" } ] } diff --git a/2019/14xxx/CVE-2019-14486.json b/2019/14xxx/CVE-2019-14486.json new file mode 100644 index 00000000000..ec79746dfd6 --- /dev/null +++ b/2019/14xxx/CVE-2019-14486.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-14486", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "GnuCOBOL 2.2 has a buffer overflow in cb_evaluate_expr in cobc/field.c via crafted COBOL source code." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://sourceforge.net/p/open-cobol/bugs/582/", + "refsource": "MISC", + "name": "https://sourceforge.net/p/open-cobol/bugs/582/" + } + ] + } +} \ No newline at end of file