diff --git a/2015/9xxx/CVE-2015-9282.json b/2015/9xxx/CVE-2015-9282.json new file mode 100644 index 00000000000..5080d9aae35 --- /dev/null +++ b/2015/9xxx/CVE-2015-9282.json @@ -0,0 +1,77 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2015-9282", + "STATE" : "PUBLIC" + }, + "affects" : { + "vendor" : { + "vendor_data" : [ + { + "product" : { + "product_data" : [ + { + "product_name" : "n/a", + "version" : { + "version_data" : [ + { + "version_value" : "n/a" + } + ] + } + } + ] + }, + "vendor_name" : "n/a" + } + ] + } + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "The Pie Chart Panel plugin through 2019-01-02 for Grafana is vulnerable to XSS via legend data or tooltip data. When a chart is included in a Grafana dashboard, this vulnerability could allow an attacker to gain remote unauthenticated access to the dashboard." + } + ] + }, + "problemtype" : { + "problemtype_data" : [ + { + "description" : [ + { + "lang" : "eng", + "value" : "n/a" + } + ] + } + ] + }, + "references" : { + "reference_data" : [ + { + "name" : "https://github.com/grafana/grafana/issues/4117", + "refsource" : "MISC", + "url" : "https://github.com/grafana/grafana/issues/4117" + }, + { + "name" : "https://github.com/grafana/piechart-panel/issues/3", + "refsource" : "MISC", + "url" : "https://github.com/grafana/piechart-panel/issues/3" + }, + { + "name" : "https://github.com/grafana/piechart-panel/pull/163", + "refsource" : "MISC", + "url" : "https://github.com/grafana/piechart-panel/pull/163" + }, + { + "name" : "https://padlock.argh.in/2019/02/05/exploiting-xss-grafana.html", + "refsource" : "MISC", + "url" : "https://padlock.argh.in/2019/02/05/exploiting-xss-grafana.html" + } + ] + } +} diff --git a/2019/3xxx/CVE-2019-3463.json b/2019/3xxx/CVE-2019-3463.json index 6ff37f781ee..dcf4409ecbd 100644 --- a/2019/3xxx/CVE-2019-3463.json +++ b/2019/3xxx/CVE-2019-3463.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://tracker.debian.org/news/1026713/accepted-rssh-234-5deb9u2-source-amd64-into-stable-embargoed-stable/", + "refsource" : "MISC", "url" : "https://tracker.debian.org/news/1026713/accepted-rssh-234-5deb9u2-source-amd64-into-stable-embargoed-stable/" } ] diff --git a/2019/3xxx/CVE-2019-3464.json b/2019/3xxx/CVE-2019-3464.json index d50be64b141..9183adb5955 100644 --- a/2019/3xxx/CVE-2019-3464.json +++ b/2019/3xxx/CVE-2019-3464.json @@ -54,6 +54,8 @@ "references" : { "reference_data" : [ { + "name" : "https://tracker.debian.org/news/1026713/accepted-rssh-234-5deb9u2-source-amd64-into-stable-embargoed-stable/", + "refsource" : "MISC", "url" : "https://tracker.debian.org/news/1026713/accepted-rssh-234-5deb9u2-source-amd64-into-stable-embargoed-stable/" } ] diff --git a/2019/7xxx/CVE-2019-7537.json b/2019/7xxx/CVE-2019-7537.json new file mode 100644 index 00000000000..8c69f50c6a3 --- /dev/null +++ b/2019/7xxx/CVE-2019-7537.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7537", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7538.json b/2019/7xxx/CVE-2019-7538.json new file mode 100644 index 00000000000..e3f473e67ef --- /dev/null +++ b/2019/7xxx/CVE-2019-7538.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7538", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7539.json b/2019/7xxx/CVE-2019-7539.json new file mode 100644 index 00000000000..e0b36ff9205 --- /dev/null +++ b/2019/7xxx/CVE-2019-7539.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7539", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7540.json b/2019/7xxx/CVE-2019-7540.json new file mode 100644 index 00000000000..201d197f6a6 --- /dev/null +++ b/2019/7xxx/CVE-2019-7540.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7540", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} diff --git a/2019/7xxx/CVE-2019-7541.json b/2019/7xxx/CVE-2019-7541.json new file mode 100644 index 00000000000..6ec4a3cec6f --- /dev/null +++ b/2019/7xxx/CVE-2019-7541.json @@ -0,0 +1,18 @@ +{ + "CVE_data_meta" : { + "ASSIGNER" : "cve@mitre.org", + "ID" : "CVE-2019-7541", + "STATE" : "RESERVED" + }, + "data_format" : "MITRE", + "data_type" : "CVE", + "data_version" : "4.0", + "description" : { + "description_data" : [ + { + "lang" : "eng", + "value" : "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +}