diff --git a/2019/15xxx/CVE-2019-15900.json b/2019/15xxx/CVE-2019-15900.json new file mode 100644 index 00000000000..dbf0ddebe13 --- /dev/null +++ b/2019/15xxx/CVE-2019-15900.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15900", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in slicer69 doas before 6.2 on certain platforms other than OpenBSD. On platforms without strtonum(3), sscanf was used without checking for error cases. Instead, the uninitialized variable errstr was checked and in some cases returned success even if sscanf failed. The result was that, instead of reporting that the supplied username or group name did not exist, it would execute the command as root." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/slicer69/doas/commit/2f83222829448e5bc4c9391d607ec265a1e06531", + "refsource": "MISC", + "name": "https://github.com/slicer69/doas/commit/2f83222829448e5bc4c9391d607ec265a1e06531" + }, + { + "url": "https://github.com/slicer69/doas/compare/6.1p1...6.2", + "refsource": "MISC", + "name": "https://github.com/slicer69/doas/compare/6.1p1...6.2" + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15901.json b/2019/15xxx/CVE-2019-15901.json new file mode 100644 index 00000000000..04657b0933d --- /dev/null +++ b/2019/15xxx/CVE-2019-15901.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15901", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in slicer69 doas before 6.2 on certain platforms other than OpenBSD. A setusercontext(3) call with flags to change the UID, primary GID, and secondary GIDs was replaced (on certain platforms: Linux and possibly NetBSD) with a single setuid(2) call. This resulted in neither changing the group id nor initializing secondary group ids." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://github.com/slicer69/doas/compare/6.1p1...6.2", + "refsource": "MISC", + "name": "https://github.com/slicer69/doas/compare/6.1p1...6.2" + }, + { + "url": "https://github.com/slicer69/doas/commit/6cf0236184ff6304bf5e267ccf7ef02874069697", + "refsource": "MISC", + "name": "https://github.com/slicer69/doas/commit/6cf0236184ff6304bf5e267ccf7ef02874069697" + }, + { + "url": "https://github.com/slicer69/doas/pull/23", + "refsource": "MISC", + "name": "https://github.com/slicer69/doas/pull/23" + } + ] + } +} \ No newline at end of file diff --git a/2019/17xxx/CVE-2019-17207.json b/2019/17xxx/CVE-2019-17207.json new file mode 100644 index 00000000000..13c3a39a9fd --- /dev/null +++ b/2019/17xxx/CVE-2019-17207.json @@ -0,0 +1,77 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-17207", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "A reflected XSS vulnerability was found in includes/admin/table-printer.php in the broken-link-checker (aka Broken Link Checker) plugin 1.11.8 for WordPress. This allows unauthorized users to inject client-side JavaScript into an admin-only WordPress page via the wp-admin/tools.php?page=view-broken-links s_filter parameter in a search action." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/broken-link-checker/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/broken-link-checker/#developers" + }, + { + "refsource": "FULLDISC", + "name": "20191015 Reflected XSS via Broken Link Checker v.1.11.8 WordPress Plugin", + "url": "http://seclists.org/fulldisclosure/2019/Oct/31" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/154875/WordPress-Broken-Link-Checker-1.11.8-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/154875/WordPress-Broken-Link-Checker-1.11.8-Cross-Site-Scripting.html" + }, + { + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/9917", + "url": "https://wpvulndb.com/vulnerabilities/9917" + } + ] + } +} \ No newline at end of file