diff --git a/2012/6xxx/CVE-2012-6652.json b/2012/6xxx/CVE-2012-6652.json index f20cf322d84..6e54d0469f0 100644 --- a/2012/6xxx/CVE-2012-6652.json +++ b/2012/6xxx/CVE-2012-6652.json @@ -2,7 +2,7 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2012-6652", - "STATE": "RESERVED" + "STATE": "PUBLIC" }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +11,66 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Directory traversal vulnerability in pageflipbook.php script from index.php in Page Flip Book plugin for WordPress (wppageflip) allows remote attackers to include and execute arbitrary local files via a .. (dot dot) in the pageflipbook_language parameter." + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://wordpress.org/support/topic/pageflipbook-pageflipbook_language-parameter-local-file-inclusion/", + "url": "https://wordpress.org/support/topic/pageflipbook-pageflipbook_language-parameter-local-file-inclusion/" + }, + { + "refsource": "MISC", + "name": "http://ceriksen.com/2012/07/10/wordpress-a-page-flip-book-plugin-local-file-inclusion-vulnerability/", + "url": "http://ceriksen.com/2012/07/10/wordpress-a-page-flip-book-plugin-local-file-inclusion-vulnerability/" + }, + { + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2014/07/30/2", + "url": "https://www.openwall.com/lists/oss-security/2014/07/30/2" + }, + { + "refsource": "MISC", + "name": "https://www.openwall.com/lists/oss-security/2014/07/31/8", + "url": "https://www.openwall.com/lists/oss-security/2014/07/31/8" + } + ] + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] } ] } diff --git a/2018/15xxx/CVE-2018-15128.json b/2018/15xxx/CVE-2018-15128.json index b1774a94a55..55cd621d706 100644 --- a/2018/15xxx/CVE-2018-15128.json +++ b/2018/15xxx/CVE-2018-15128.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-15128", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered in Polycom Group Series 6.1.6.1 and earlier, HDX 3.1.12 and earlier, and Pano 1.1.1 and earlier. A remote code execution vulnerability exists in the content sharing functionality because of a Buffer Overflow via crafted packets." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://support.polycom.com/content/dam/polycom-support/global/documentation/remote-code-exectuion-vulnerability-group-series.pdf", + "refsource": "MISC", + "name": "https://support.polycom.com/content/dam/polycom-support/global/documentation/remote-code-exectuion-vulnerability-group-series.pdf" } ] } diff --git a/2018/18xxx/CVE-2018-18466.json b/2018/18xxx/CVE-2018-18466.json index 3c07d9cd6b9..49da95ea931 100644 --- a/2018/18xxx/CVE-2018-18466.json +++ b/2018/18xxx/CVE-2018-18466.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue was discovered in SecurEnvoy SecurAccess 9.3.502. When put in Debug mode and used for RDP connections, the application stores the emergency credentials in cleartext in the logs (present in the DEBUG folder) that can be accessed by anyone." + "value": "** DISPUTED ** An issue was discovered in SecurEnvoy SecurAccess 9.3.502. When put in Debug mode and used for RDP connections, the application stores the emergency credentials in cleartext in the logs (present in the DEBUG folder) that can be accessed by anyone. NOTE: The vendor disputes this as a vulnerability since the disclosure of a local account password (actually an alpha numeric passcode) is achievable only when a custom registry key is added to the windows registry. This action requires administrator access and the registry key is only provided by support staff at securenvoy to troubleshoot customer issues." } ] }, diff --git a/2018/18xxx/CVE-2018-18524.json b/2018/18xxx/CVE-2018-18524.json index 5f3ae61bf26..bf31e9b5ec7 100644 --- a/2018/18xxx/CVE-2018-18524.json +++ b/2018/18xxx/CVE-2018-18524.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-18524", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Evernote 6.15 on Windows has an incorrectly repaired stored XSS vulnerability. An attacker can use this XSS issue to inject Node.js code under Present mode. After a victim opens an affected note under Present mode, the attacker can read the victim's files and achieve remote execution command on the victim's computer." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://evernote.com/intl/en/security/updates", + "refsource": "MISC", + "name": "https://evernote.com/intl/en/security/updates" + }, + { + "refsource": "MISC", + "name": "https://paper.seebug.org/737/", + "url": "https://paper.seebug.org/737/" } ] } diff --git a/2018/18xxx/CVE-2018-18872.json b/2018/18xxx/CVE-2018-18872.json index ba182db3f1a..a9a92555b70 100644 --- a/2018/18xxx/CVE-2018-18872.json +++ b/2018/18xxx/CVE-2018-18872.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-18872", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Kieran O'Shea Calendar plugin before 1.3.11 for WordPress has Stored XSS via the event_title parameter in a wp-admin/admin.php?page=calendar add action, or the category name during category creation at the wp-admin/admin.php?page=calendar-categories URI." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/9141", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/9141" } ] } diff --git a/2018/19xxx/CVE-2018-19048.json b/2018/19xxx/CVE-2018-19048.json index ab7eac9d1f3..816dd8aa814 100644 --- a/2018/19xxx/CVE-2018-19048.json +++ b/2018/19xxx/CVE-2018-19048.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-19048", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,43 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Simditor through 2.3.21 allows DOM XSS via an onload attribute within a malformed SVG element." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/hkglue/simditor_demo.git", + "refsource": "MISC", + "name": "https://github.com/hkglue/simditor_demo.git" + }, + { + "refsource": "MISC", + "name": "https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd", + "url": "https://github.com/mycolorway/simditor/commit/ef01a643cbb7f8163535d6bfb71135f80ec6a6fd" + }, + { + "refsource": "MISC", + "name": "https://github.com/hkglue/simditor_dom_xss/blob/master/README.md", + "url": "https://github.com/hkglue/simditor_dom_xss/blob/master/README.md" + }, + { + "refsource": "MISC", + "name": "https://github.com/mycolorway/simditor/releases/tag/v2.3.22", + "url": "https://github.com/mycolorway/simditor/releases/tag/v2.3.22" } ] } diff --git a/2018/19xxx/CVE-2018-19986.json b/2018/19xxx/CVE-2018-19986.json index 8c381d2e1fa..978d944ad41 100644 --- a/2018/19xxx/CVE-2018-19986.json +++ b/2018/19xxx/CVE-2018-19986.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-19986", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the /HNAP1/SetRouterSettings message, the RemotePort parameter is vulnerable, and the vulnerability affects D-Link DIR-818LW Rev.A 2.05.B03 and DIR-822 B1 202KRb06 devices. In the SetRouterSettings.php source code, the RemotePort parameter is saved in the $path_inf_wan1.\"/web\" internal configuration memory without any regex checking. And in the IPTWAN_build_command function of the iptwan.php source code, the data in $path_inf_wan1.\"/web\" is used with the iptables command without any regex checking. A vulnerable /HNAP1/SetRouterSettings XML message could have shell metacharacters in the RemotePort element such as the `telnetd` string." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990", + "refsource": "MISC", + "name": "https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990" } ] } diff --git a/2018/19xxx/CVE-2018-19987.json b/2018/19xxx/CVE-2018-19987.json index f82bbfa5297..981a67f1b39 100644 --- a/2018/19xxx/CVE-2018-19987.json +++ b/2018/19xxx/CVE-2018-19987.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-19987", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "D-Link DIR-822 Rev.B 202KRb06, DIR-822 Rev.C 3.10B06, DIR-860L Rev.B 2.03.B03, DIR-868L Rev.B 2.05B02, DIR-880L Rev.A 1.20B01_01_i3se_BETA, and DIR-890L Rev.A 1.21B02_BETA devices mishandle IsAccessPoint in /HNAP1/SetAccessPointMode. In the SetAccessPointMode.php source code, the IsAccessPoint parameter is saved in the ShellPath script file without any regex checking. After the script file is executed, the command injection occurs. A vulnerable /HNAP1/SetAccessPointMode XML message could have shell metacharacters in the IsAccessPoint element such as the `telnetd` string." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990", + "refsource": "MISC", + "name": "https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990" } ] } diff --git a/2018/19xxx/CVE-2018-19988.json b/2018/19xxx/CVE-2018-19988.json index 48d28a3f635..f9547ffbb9a 100644 --- a/2018/19xxx/CVE-2018-19988.json +++ b/2018/19xxx/CVE-2018-19988.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-19988", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the /HNAP1/SetClientInfoDemo message, the AudioMute and AudioEnable parameters are vulnerable, and the vulnerabilities affect D-Link DIR-868L Rev.B 2.05B02 devices. In the SetClientInfoDemo.php source code, the AudioMute and AudioEnble parameters are saved in the ShellPath script file without any regex checking. After the script file is executed, the command injection occurs. It needs to bypass the wget command option with a single quote. A vulnerable /HNAP1/SetClientInfoDemo XML message could have single quotes and backquotes in the AudioMute or AudioEnable element, such as the '`telnetd`' string." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990", + "refsource": "MISC", + "name": "https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990" } ] } diff --git a/2018/19xxx/CVE-2018-19989.json b/2018/19xxx/CVE-2018-19989.json index 13ff71bc82d..bff7e13dad7 100644 --- a/2018/19xxx/CVE-2018-19989.json +++ b/2018/19xxx/CVE-2018-19989.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-19989", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the /HNAP1/SetQoSSettings message, the uplink parameter is vulnerable, and the vulnerability affects D-Link DIR-822 Rev.B 202KRb06 and DIR-822 Rev.C 3.10B06 devices. In the SetQoSSettings.php source code, the uplink parameter is saved in the /bwc/entry:1/bandwidth and /bwc/entry:2/bandwidth internal configuration memory without any regex checking. And in the bwc_tc_spq_start, bwc_tc_wfq_start, and bwc_tc_adb_start functions of the bwcsvcs.php source code, the data in /bwc/entry:1/bandwidth and /bwc/entry:2/bandwidth is used with the tc command without any regex checking. A vulnerable /HNAP1/SetQoSSettings XML message could have shell metacharacters in the uplink element such as the `telnetd` string." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990", + "refsource": "MISC", + "name": "https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990" } ] } diff --git a/2018/19xxx/CVE-2018-19990.json b/2018/19xxx/CVE-2018-19990.json index ac78daa1b00..49803dde818 100644 --- a/2018/19xxx/CVE-2018-19990.json +++ b/2018/19xxx/CVE-2018-19990.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2018-19990", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "In the /HNAP1/SetWiFiVerifyAlpha message, the WPSPIN parameter is vulnerable, and the vulnerability affects D-Link DIR-822 B1 202KRb06 devices. In the SetWiFiVerifyAlpha.php source code, the WPSPIN parameter is saved in the $rphyinf1.\"/media/wps/enrollee/pin\" and $rphyinf2.\"/media/wps/enrollee/pin\" and $rphyinf3.\"/media/wps/enrollee/pin\" internal configuration memory without any regex checking. And in the do_wps function of the wps.php source code, the data in $rphyinf3.\"/media/wps/enrollee/pin\" is used with the wpatalk command without any regex checking. A vulnerable /HNAP1/SetWiFiVerifyAlpha XML message could have shell metacharacters in the WPSPIN element such as the `telnetd` string." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990", + "refsource": "MISC", + "name": "https://github.com/pr0v3rbs/CVE/tree/master/CVE-2018-19986%20-%2019990" } ] } diff --git a/2018/20xxx/CVE-2018-20782.json b/2018/20xxx/CVE-2018-20782.json index 9aebc188ff9..6148f7f9d64 100644 --- a/2018/20xxx/CVE-2018-20782.json +++ b/2018/20xxx/CVE-2018-20782.json @@ -61,6 +61,11 @@ "name": "46414", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/46414/" + }, + { + "refsource": "MISC", + "name": "https://github.com/GloBee-Official/woocommerce-payment-api-plugin/issues/3", + "url": "https://github.com/GloBee-Official/woocommerce-payment-api-plugin/issues/3" } ] } diff --git a/2018/4xxx/CVE-2018-4360.json b/2018/4xxx/CVE-2018-4360.json index 8dfe8620fba..a135fb26bda 100644 --- a/2018/4xxx/CVE-2018-4360.json +++ b/2018/4xxx/CVE-2018-4360.json @@ -68,6 +68,16 @@ "refsource": "MISC", "name": "https://support.apple.com/kb/HT209109", "url": "https://support.apple.com/kb/HT209109" + }, + { + "refsource": "MISC", + "name": "https://devcraft.io/2019/02/19/cve-2018-4360-webkit-information-leakage-with-dommatrixinvertself.html", + "url": "https://devcraft.io/2019/02/19/cve-2018-4360-webkit-information-leakage-with-dommatrixinvertself.html" + }, + { + "refsource": "MISC", + "name": "https://github.com/WebKit/webkit/commit/a0b0e01648892b0bb60a01aca619eec85eb27f7a", + "url": "https://github.com/WebKit/webkit/commit/a0b0e01648892b0bb60a01aca619eec85eb27f7a" } ] }, diff --git a/2019/12xxx/CVE-2019-12043.json b/2019/12xxx/CVE-2019-12043.json new file mode 100644 index 00000000000..99b5ffe55b0 --- /dev/null +++ b/2019/12xxx/CVE-2019-12043.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-12043", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In remarkable 1.7.1, lib/parser_inline.js mishandles URL filtering, which allows attackers to trigger XSS via unprintable characters, as demonstrated by a \\x0ejavascript: URL." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/jonschlinkert/remarkable/issues/332", + "refsource": "MISC", + "name": "https://github.com/jonschlinkert/remarkable/issues/332" + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12044.json b/2019/12xxx/CVE-2019-12044.json new file mode 100644 index 00000000000..afe6d0627c0 --- /dev/null +++ b/2019/12xxx/CVE-2019-12044.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12044", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/12xxx/CVE-2019-12045.json b/2019/12xxx/CVE-2019-12045.json new file mode 100644 index 00000000000..7e7b5c62ba1 --- /dev/null +++ b/2019/12xxx/CVE-2019-12045.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-12045", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/7xxx/CVE-2019-7404.json b/2019/7xxx/CVE-2019-7404.json index 761f6aba31d..41aed150bac 100644 --- a/2019/7xxx/CVE-2019-7404.json +++ b/2019/7xxx/CVE-2019-7404.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7404", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "An issue was discovered on LG GAMP-7100, GAPM-7200, and GAPM-8000 routers. An unauthenticated user can read a log file via an HTTP request containing its full pathname, such as http://192.168.0.1/var/gapm7100_${today's_date}.log for reading a filename such as gapm7100_190101.log." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/epistemophilia/CVEs/blob/master/LG-GAMP-Routers/CVE-2019-7404/poc-cve-2019-7404.py", + "refsource": "MISC", + "name": "https://github.com/epistemophilia/CVEs/blob/master/LG-GAMP-Routers/CVE-2019-7404/poc-cve-2019-7404.py" } ] } diff --git a/2019/7xxx/CVE-2019-7409.json b/2019/7xxx/CVE-2019-7409.json index 7a42f73906b..3d5e5ce9841 100644 --- a/2019/7xxx/CVE-2019-7409.json +++ b/2019/7xxx/CVE-2019-7409.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7409", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple cross-site scripting (XSS) vulnerabilities in ProfileDesign CMS v6.0.2.5 allows remote attackers to inject arbitrary web script or HTML via the (1) page, (2) gbs, (3) side, (4) id, (5) imgid, (6) cat, or (7) orderby parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://metamorfosec.com/Files/Advisories/METS-2019-001-Multiple_XSS_Vulnerabilities_in_ProfileDesign_CMS_v6.0.2.5.txt", + "refsource": "MISC", + "name": "https://metamorfosec.com/Files/Advisories/METS-2019-001-Multiple_XSS_Vulnerabilities_in_ProfileDesign_CMS_v6.0.2.5.txt" + }, + { + "url": "https://www.vegadesign.net/?side=pdcmd_endringslogg", + "refsource": "MISC", + "name": "https://www.vegadesign.net/?side=pdcmd_endringslogg" } ] } diff --git a/2019/7xxx/CVE-2019-7411.json b/2019/7xxx/CVE-2019-7411.json index 79687ab6e3a..327fb77dd53 100644 --- a/2019/7xxx/CVE-2019-7411.json +++ b/2019/7xxx/CVE-2019-7411.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-7411", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,28 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Multiple stored cross-site scripting (XSS) in the MyThemeShop Launcher plugin 1.0.8 for WordPress allow remote authenticated users to inject arbitrary web script or HTML via fields as follows: (1) Title, (2) Favicon, (3) Meta Description, (4) Subscribe Form (Name field label, Last name field label, Email field label), (5) Contact Form (Name field label and Email field label), and (6) Social Links (Facebook Page URL, Twitter Page URL, Instagram Page URL, YouTube Page URL, Linkedin Page URL, Google+ Page URL, RSS URL)." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://metamorfosec.com/Files/Advisories/METS-2019-002-Multiple_Stored_XSS_Vulnerabilities_in_the_MyThemeShop_Launcher_plugin_v1.0.8_for_WordPress.txt", + "refsource": "MISC", + "name": "https://metamorfosec.com/Files/Advisories/METS-2019-002-Multiple_Stored_XSS_Vulnerabilities_in_the_MyThemeShop_Launcher_plugin_v1.0.8_for_WordPress.txt" } ] } diff --git a/2019/7xxx/CVE-2019-7413.json b/2019/7xxx/CVE-2019-7413.json index a07dcc2c6c4..e365272a7fd 100644 --- a/2019/7xxx/CVE-2019-7413.json +++ b/2019/7xxx/CVE-2019-7413.json @@ -56,6 +56,11 @@ "name": "https://plugins.trac.wordpress.org/changeset/2024194/", "refsource": "MISC", "url": "https://plugins.trac.wordpress.org/changeset/2024194/" + }, + { + "refsource": "MISC", + "name": "https://metamorfosec.com/Files/Advisories/METS-2019-004-A_XSS_Vulnerability_in_Parallax_Scroll_plugin_before_v2.1_for_WordPress.txt", + "url": "https://metamorfosec.com/Files/Advisories/METS-2019-004-A_XSS_Vulnerability_in_Parallax_Scroll_plugin_before_v2.1_for_WordPress.txt" } ] } diff --git a/2019/8xxx/CVE-2019-8350.json b/2019/8xxx/CVE-2019-8350.json index b30203084b0..e126e484e9e 100644 --- a/2019/8xxx/CVE-2019-8350.json +++ b/2019/8xxx/CVE-2019-8350.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2019-8350", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,8 +34,48 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The Simple - Better Banking application 2.45.0 through 2.45.3 (fixed in 2.46.0) for Android was affected by an information disclosure vulnerability that leaked the user's password to the keyboard autocomplete functionality. Third-party Android keyboards that capture the password may store this password in cleartext, or transmit the password to third-party services for keyboard customization purposes. A compromise of any datastore that contains keyboard autocompletion caches would result in the disclosure of the user's Simple Bank password." } ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.bishopfox.com/news/2019/02/simple-better-banking-android-v-2-45-0-2-45-3-sensitive-information-disclosure/", + "refsource": "MISC", + "name": "https://www.bishopfox.com/news/2019/02/simple-better-banking-android-v-2-45-0-2-45-3-sensitive-information-disclosure/" + }, + { + "url": "https://www.simple.com/policies/security", + "refsource": "MISC", + "name": "https://www.simple.com/policies/security" + } + ] + }, + "impact": { + "cvss": { + "attackComplexity": "LOW", + "attackVector": "PHYSICAL", + "availabilityImpact": "HIGH", + "confidentialityImpact": "HIGH", + "integrityImpact": "HIGH", + "privilegesRequired": "LOW", + "scope": "UNCHANGED", + "userInteraction": "NONE", + "vectorString": "CVSS:3.0/AC:L/AV:P/A:H/C:H/I:H/PR:L/S:U/UI:N", + "version": "3.0" + } } } \ No newline at end of file