From 9759da59fd32da2ee843e3b817b2d6ad6ad44574 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 29 Aug 2019 17:00:48 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2018/16xxx/CVE-2018-16254.json | 2 +- 2019/15xxx/CVE-2019-15717.json | 62 ++++++++++++++++++++++++++++++++++ 2019/15xxx/CVE-2019-15778.json | 5 +++ 2019/15xxx/CVE-2019-15779.json | 5 +++ 2019/9xxx/CVE-2019-9147.json | 10 ++++++ 2019/9xxx/CVE-2019-9148.json | 10 ++++++ 2019/9xxx/CVE-2019-9149.json | 10 ++++++ 2019/9xxx/CVE-2019-9150.json | 10 ++++++ 8 files changed, 113 insertions(+), 1 deletion(-) create mode 100644 2019/15xxx/CVE-2019-15717.json diff --git a/2018/16xxx/CVE-2018-16254.json b/2018/16xxx/CVE-2018-16254.json index 4bcdac29b34..639f42fddab 100644 --- a/2018/16xxx/CVE-2018-16254.json +++ b/2018/16xxx/CVE-2018-16254.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "There is an XSS vulnerability in WP All Import plugin 3.4.9 for WordPress via action=options." + "value": "** DISPUTED ** There is an XSS vulnerability in WP All Import plugin 3.4.9 for WordPress via action=options. NOTE: The vendor states that this is not a vulnerability. WP All Import is only able to be used by a logged in administrator, and the action described can only be taken advantage of by a logged in administrator." } ] }, diff --git a/2019/15xxx/CVE-2019-15717.json b/2019/15xxx/CVE-2019-15717.json new file mode 100644 index 00000000000..dbe5642271a --- /dev/null +++ b/2019/15xxx/CVE-2019-15717.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-15717", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Irssi 1.2.x before 1.2.2 has a use-after-free if the IRC server sends a double CAP." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://irssi.org/security/irssi_sa_2019_08.txt", + "url": "https://irssi.org/security/irssi_sa_2019_08.txt" + } + ] + } +} \ No newline at end of file diff --git a/2019/15xxx/CVE-2019-15778.json b/2019/15xxx/CVE-2019-15778.json index 2eb6db27c2c..cbf7d19481d 100644 --- a/2019/15xxx/CVE-2019-15778.json +++ b/2019/15xxx/CVE-2019-15778.json @@ -61,6 +61,11 @@ "url": "https://www.pluginvulnerabilities.com/2019/08/20/vulnerablity-details-authenticated-persistent-cross-site-scripting-xss-in-additional-variation-images-for-woocommerce/", "refsource": "MISC", "name": "https://www.pluginvulnerabilities.com/2019/08/20/vulnerablity-details-authenticated-persistent-cross-site-scripting-xss-in-additional-variation-images-for-woocommerce/" + }, + { + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/9852", + "url": "https://wpvulndb.com/vulnerabilities/9852" } ] } diff --git a/2019/15xxx/CVE-2019-15779.json b/2019/15xxx/CVE-2019-15779.json index 71f1c73fbb3..2d1938617b3 100644 --- a/2019/15xxx/CVE-2019-15779.json +++ b/2019/15xxx/CVE-2019-15779.json @@ -56,6 +56,11 @@ "url": "https://wordpress.org/plugins/insta-gallery/#developers", "refsource": "MISC", "name": "https://wordpress.org/plugins/insta-gallery/#developers" + }, + { + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/9853", + "url": "https://wpvulndb.com/vulnerabilities/9853" } ] } diff --git a/2019/9xxx/CVE-2019-9147.json b/2019/9xxx/CVE-2019-9147.json index 1875646ff48..28e07ebd020 100644 --- a/2019/9xxx/CVE-2019-9147.json +++ b/2019/9xxx/CVE-2019-9147.json @@ -56,6 +56,16 @@ "refsource": "CONFIRM", "name": "https://github.com/mailvelope/mailvelope/blob/master/Changelog.md#v310", "url": "https://github.com/mailvelope/mailvelope/blob/master/Changelog.md#v310" + }, + { + "refsource": "MISC", + "name": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html", + "url": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html" + }, + { + "refsource": "MISC", + "name": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.pdf?__blob=publicationFile&v=3", + "url": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.pdf?__blob=publicationFile&v=3" } ] } diff --git a/2019/9xxx/CVE-2019-9148.json b/2019/9xxx/CVE-2019-9148.json index 62b599c515f..2ccecb2d703 100644 --- a/2019/9xxx/CVE-2019-9148.json +++ b/2019/9xxx/CVE-2019-9148.json @@ -56,6 +56,16 @@ "refsource": "CONFIRM", "name": "https://github.com/mailvelope/mailvelope/blob/master/Changelog.md#v330", "url": "https://github.com/mailvelope/mailvelope/blob/master/Changelog.md#v330" + }, + { + "refsource": "MISC", + "name": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html", + "url": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html" + }, + { + "refsource": "MISC", + "name": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.pdf?__blob=publicationFile&v=3", + "url": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.pdf?__blob=publicationFile&v=3" } ] } diff --git a/2019/9xxx/CVE-2019-9149.json b/2019/9xxx/CVE-2019-9149.json index 1bab9aa5c1d..30ab73d74ff 100644 --- a/2019/9xxx/CVE-2019-9149.json +++ b/2019/9xxx/CVE-2019-9149.json @@ -56,6 +56,16 @@ "refsource": "CONFIRM", "name": "https://github.com/mailvelope/mailvelope/blob/master/Changelog.md#v330", "url": "https://github.com/mailvelope/mailvelope/blob/master/Changelog.md#v330" + }, + { + "refsource": "MISC", + "name": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html", + "url": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html" + }, + { + "refsource": "MISC", + "name": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.pdf?__blob=publicationFile&v=3", + "url": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.pdf?__blob=publicationFile&v=3" } ] } diff --git a/2019/9xxx/CVE-2019-9150.json b/2019/9xxx/CVE-2019-9150.json index 464974269fe..ec2755e55c3 100644 --- a/2019/9xxx/CVE-2019-9150.json +++ b/2019/9xxx/CVE-2019-9150.json @@ -56,6 +56,16 @@ "refsource": "CONFIRM", "name": "https://github.com/mailvelope/mailvelope/blob/master/Changelog.md#v330", "url": "https://github.com/mailvelope/mailvelope/blob/master/Changelog.md#v330" + }, + { + "refsource": "MISC", + "name": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html", + "url": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.html" + }, + { + "refsource": "MISC", + "name": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.pdf?__blob=publicationFile&v=3", + "url": "https://www.bsi.bund.de/SharedDocs/Downloads/EN/BSI/Publications/Studies/Mailvelope_Extensions/Mailvelope_Extensions_pdf.pdf?__blob=publicationFile&v=3" } ] }