From bc5e460476564a0ba996eaac4dac5428b4b873a0 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 28 Nov 2018 17:07:11 -0500 Subject: [PATCH] - Synchronized data. --- 2018/19xxx/CVE-2018-19370.json | 58 +++++++++++++++++++++++++++++-- 2018/19xxx/CVE-2018-19650.json | 18 ++++++++++ 2018/19xxx/CVE-2018-19651.json | 62 ++++++++++++++++++++++++++++++++++ 2018/19xxx/CVE-2018-19652.json | 18 ++++++++++ 4 files changed, 154 insertions(+), 2 deletions(-) create mode 100644 2018/19xxx/CVE-2018-19650.json create mode 100644 2018/19xxx/CVE-2018-19651.json create mode 100644 2018/19xxx/CVE-2018-19652.json diff --git a/2018/19xxx/CVE-2018-19370.json b/2018/19xxx/CVE-2018-19370.json index 06edda4022e..a6a05510fe6 100644 --- a/2018/19xxx/CVE-2018-19370.json +++ b/2018/19xxx/CVE-2018-19370.json @@ -2,7 +2,30 @@ "CVE_data_meta" : { "ASSIGNER" : "cve@mitre.org", "ID" : "CVE-2018-19370", - "STATE" : "RESERVED" + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } }, "data_format" : "MITRE", "data_type" : "CVE", @@ -11,7 +34,38 @@ "description_data" : [ { "lang" : "eng", - "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value" : "A Race condition vulnerability in unzip_file in admin/import/class-import-settings.php in the Yoast SEO (wordpress-seo) plugin before 9.2.0 for WordPress allows an SEO Manager to perform command execution on the Operating System via a ZIP import." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/Yoast/wordpress-seo/pull/11502/commits/3bfa70a143f5ea3ee1934f3a1703bb5caf139ffa", + "refsource" : "MISC", + "url" : "https://github.com/Yoast/wordpress-seo/pull/11502/commits/3bfa70a143f5ea3ee1934f3a1703bb5caf139ffa" + }, + { + "name" : "https://wordpress.org/plugins/wordpress-seo/#developers", + "refsource" : "MISC", + "url" : "https://wordpress.org/plugins/wordpress-seo/#developers" + }, + { + "name" : "https://www.youtube.com/watch?v=nL141dcDGCY", + "refsource" : "MISC", + "url" : "https://www.youtube.com/watch?v=nL141dcDGCY" } ] } diff --git a/2018/19xxx/CVE-2018-19650.json b/2018/19xxx/CVE-2018-19650.json new file mode 100644 index 00000000000..d894edca02b --- /dev/null +++ b/2018/19xxx/CVE-2018-19650.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19650", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19651.json b/2018/19xxx/CVE-2018-19651.json new file mode 100644 index 00000000000..b6ea32344f1 --- /dev/null +++ b/2018/19xxx/CVE-2018-19651.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19651", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "admin/functions/remote.php in Interspire Email Marketer through 6.1.6 has Server Side Request Forgery (SSRF) via a what=importurl&url= request with an http or https URL. This also allows reading local files with a file: URL." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://medium.com/@namhb/ssrf-to-lfi-in-interspire-email-marketer-698a748462a9", + "refsource" : "MISC", + "url" : "https://medium.com/@namhb/ssrf-to-lfi-in-interspire-email-marketer-698a748462a9" + } + ] + } +} diff --git a/2018/19xxx/CVE-2018-19652.json b/2018/19xxx/CVE-2018-19652.json new file mode 100644 index 00000000000..2490f7855d4 --- /dev/null +++ b/2018/19xxx/CVE-2018-19652.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2018-19652", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}