diff --git a/2016/1xxx/CVE-2016-1583.json b/2016/1xxx/CVE-2016-1583.json index 17d15cba839..a5122aad269 100644 --- a/2016/1xxx/CVE-2016-1583.json +++ b/2016/1xxx/CVE-2016-1583.json @@ -77,6 +77,11 @@ "refsource" : "MISC", "url" : "http://packetstormsecurity.com/files/137560/Linux-ecryptfs-Stack-Overflow.html" }, + { + "name" : "https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b", + "refsource" : "MISC", + "url" : "https://github.com/torvalds/linux/commit/f0fe970df3838c202ef6c07a4c2b36838ef0a88b" + }, { "name" : "http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2f36db71009304b3f0b95afacd8eba1f9f046b87", "refsource" : "CONFIRM", diff --git a/2018/19xxx/CVE-2018-19921.json b/2018/19xxx/CVE-2018-19921.json new file mode 100644 index 00000000000..a79b5d81659 --- /dev/null +++ b/2018/19xxx/CVE-2018-19921.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19921", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Zoho ManageEngine OpManager 12.3 before 123237 has XSS in the domain controller." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://www.manageengine.com/network-monitoring/help/read-me.html", + "refsource" : "MISC", + "url" : "https://www.manageengine.com/network-monitoring/help/read-me.html" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19922.json b/2018/19xxx/CVE-2018-19922.json new file mode 100644 index 00000000000..96165fba68a --- /dev/null +++ b/2018/19xxx/CVE-2018-19922.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19922", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "Persistent Cross-Site Scripting (XSS) in the advancedsetup_websiteblocking.html Website Blocking page of the Actiontec C1000A router with firmware through CAC004-31.30L.95 allows a remote attacker to inject arbitrary HTML into the Website Blocking page by inserting arbitrary HTML into the 'TodUrlAdd' URL parameter in a /urlfilter.cmd POST request." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/logern5/c1000a_xss/blob/master/README.md", + "refsource" : "MISC", + "url" : "https://github.com/logern5/c1000a_xss/blob/master/README.md" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19923.json b/2018/19xxx/CVE-2018-19923.json new file mode 100644 index 00000000000..17709db1e0c --- /dev/null +++ b/2018/19xxx/CVE-2018-19923.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19923", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19924.json b/2018/19xxx/CVE-2018-19924.json new file mode 100644 index 00000000000..f0b7fdcd747 --- /dev/null +++ b/2018/19xxx/CVE-2018-19924.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19924", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19925.json b/2018/19xxx/CVE-2018-19925.json new file mode 100644 index 00000000000..cda0efca153 --- /dev/null +++ b/2018/19xxx/CVE-2018-19925.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19925", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}