diff --git a/2015/9xxx/CVE-2015-9419.json b/2015/9xxx/CVE-2015-9419.json new file mode 100644 index 00000000000..7118d8e85fb --- /dev/null +++ b/2015/9xxx/CVE-2015-9419.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9419", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The captain-slider plugin 1.0.6 for WordPress has XSS via a Title or Caption section." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/captain-slider/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/captain-slider/#developers" + }, + { + "url": "https://packetstormsecurity.com/files/133362/", + "refsource": "MISC", + "name": "https://packetstormsecurity.com/files/133362/" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9420.json b/2015/9xxx/CVE-2015-9420.json new file mode 100644 index 00000000000..003336cd873 --- /dev/null +++ b/2015/9xxx/CVE-2015-9420.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9420", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The soundcloud-is-gold plugin before 2.3.2 for WordPress has XSS via the wp-admin/admin-ajax.php?action=get_soundcloud_player id parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8306", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8306" + }, + { + "url": "https://wordpress.org/plugins/soundcloud-is-gold/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/soundcloud-is-gold/#developers" + }, + { + "url": "http://cinu.pl/research/wp-plugins/mail_9acbc3ef2dd43bfb78b6b3dcf6c5ef01.html", + "refsource": "MISC", + "name": "http://cinu.pl/research/wp-plugins/mail_9acbc3ef2dd43bfb78b6b3dcf6c5ef01.html" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9421.json b/2015/9xxx/CVE-2015-9421.json new file mode 100644 index 00000000000..af4d6636b5d --- /dev/null +++ b/2015/9xxx/CVE-2015-9421.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9421", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The olevmedia-shortcodes plugin before 1.1.9 for WordPress has CSRF with resultant XSS via the wp-admin/admin-ajax.php?action=omsc_popup id parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8338", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8338" + }, + { + "url": "https://wordpress.org/plugins/olevmedia-shortcodes/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/olevmedia-shortcodes/#developers" + }, + { + "url": "http://cinu.pl/research/wp-plugins/mail_d9e466122cd9a6ca27db840cca277cdb.html", + "refsource": "MISC", + "name": "http://cinu.pl/research/wp-plugins/mail_d9e466122cd9a6ca27db840cca277cdb.html" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9422.json b/2015/9xxx/CVE-2015-9422.json new file mode 100644 index 00000000000..d40ef2eaa83 --- /dev/null +++ b/2015/9xxx/CVE-2015-9422.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9422", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The PlugNedit Adaptive Editor plugin before 6.2.0 for WordPress has CSRF with resultant XSS via wp-admin/admin-ajax.php?action=simple_fields_field_type_post_dialog_load plugnedit_width, pnemedcount, PlugneditBGColor, PlugneditEditorMargin, or plugneditcontent parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8331", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8331" + }, + { + "url": "https://wordpress.org/plugins/plugnedit/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/plugnedit/#developers" + }, + { + "url": "http://cinu.pl/research/wp-plugins/mail_b5405e735cb605b2fd1a300bb8be4860.html", + "refsource": "MISC", + "name": "http://cinu.pl/research/wp-plugins/mail_b5405e735cb605b2fd1a300bb8be4860.html" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9423.json b/2015/9xxx/CVE-2015-9423.json new file mode 100644 index 00000000000..a80e194034d --- /dev/null +++ b/2015/9xxx/CVE-2015-9423.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9423", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The PlugNedit Adaptive Editor plugin before 6.2.0 for WordPress has XSS via wp-admin/admin-ajax.php?action=simple_fields_field_type_post_dialog_load PlugneditBGColor, PlugneditEditorMargin, plugnedit_width, pnemedcount, or plugneditcontent parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8331", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8331" + }, + { + "url": "https://wordpress.org/plugins/plugnedit/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/plugnedit/#developers" + }, + { + "url": "http://cinu.pl/research/wp-plugins/mail_b5405e735cb605b2fd1a300bb8be4860.html", + "refsource": "MISC", + "name": "http://cinu.pl/research/wp-plugins/mail_b5405e735cb605b2fd1a300bb8be4860.html" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9424.json b/2015/9xxx/CVE-2015-9424.json new file mode 100644 index 00000000000..b5da77b4246 --- /dev/null +++ b/2015/9xxx/CVE-2015-9424.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9424", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The multicons plugin before 3.0 for WordPress has CSRF with resultant XSS via the wp-admin/options-general.php?page=multicons%2Fmulticons.php global_url or admin_url parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8330", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8330" + }, + { + "url": "https://wordpress.org/plugins/multicons/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/multicons/#developers" + }, + { + "url": "http://cinu.pl/research/wp-plugins/mail_aea47a98ad3088dbb33528ded8e1b124.html", + "refsource": "MISC", + "name": "http://cinu.pl/research/wp-plugins/mail_aea47a98ad3088dbb33528ded8e1b124.html" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9425.json b/2015/9xxx/CVE-2015-9425.json new file mode 100644 index 00000000000..6601e14a277 --- /dev/null +++ b/2015/9xxx/CVE-2015-9425.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9425", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The social-locker plugin before 4.2.5 for WordPress has CSRF with resultant XSS via the wp-admin/edit.php?post_type=opanda-item&page=license-manager-sociallocker-next licensekey parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8327", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8327" + }, + { + "url": "https://wordpress.org/plugins/social-locker/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/social-locker/#developers" + }, + { + "url": "http://cinu.pl/research/wp-plugins/mail_9e26c6f71bf8467e4a5017b15d5acddc.html", + "refsource": "MISC", + "name": "http://cinu.pl/research/wp-plugins/mail_9e26c6f71bf8467e4a5017b15d5acddc.html" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9426.json b/2015/9xxx/CVE-2015-9426.json new file mode 100644 index 00000000000..4cb7ef28d7e --- /dev/null +++ b/2015/9xxx/CVE-2015-9426.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9426", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The manual-image-crop plugin before 1.11 for WordPress has CSRF with resultant XSS via the wp-admin/admin-ajax.php?action=mic_editor_window postId parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8297", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8297" + }, + { + "url": "https://wordpress.org/plugins/manual-image-crop/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/manual-image-crop/#developers" + }, + { + "url": "http://cinu.pl/research/wp-plugins/mail_7c87194ce1dcf0642135d17a71ed91cd.html", + "refsource": "MISC", + "name": "http://cinu.pl/research/wp-plugins/mail_7c87194ce1dcf0642135d17a71ed91cd.html" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9427.json b/2015/9xxx/CVE-2015-9427.json new file mode 100644 index 00000000000..4d1bc7e02a2 --- /dev/null +++ b/2015/9xxx/CVE-2015-9427.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9427", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The googmonify plugin through 0.5.1 for WordPress has CSRF with resultant XSS via the wp-admin/options-general.php?page=googmonify.php PID or AID parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8158", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8158" + }, + { + "url": "https://wordpress.org/plugins/googmonify/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/googmonify/#developers" + }, + { + "url": "http://packetstormsecurity.com/files/133267/", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/133267/" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9428.json b/2015/9xxx/CVE-2015-9428.json new file mode 100644 index 00000000000..f9df519de6a --- /dev/null +++ b/2015/9xxx/CVE-2015-9428.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9428", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The wplegalpages plugin before 1.1 for WordPress has CSRF with resultant XSS via wp-admin/admin.php?page=legal-pages lp-domain-name, lp-business-name, lp-phone, lp-street, lp-city-state, lp-country, lp-email, lp-address, or lp-niche parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8291", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8291" + }, + { + "url": "https://wordpress.org/plugins/wplegalpages/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/wplegalpages/#developers" + }, + { + "url": "http://cinu.pl/research/wp-plugins/mail_4e7cf11876edb93517405b69cb033741.html", + "refsource": "MISC", + "name": "http://cinu.pl/research/wp-plugins/mail_4e7cf11876edb93517405b69cb033741.html" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9429.json b/2015/9xxx/CVE-2015-9429.json new file mode 100644 index 00000000000..265f8e67a20 --- /dev/null +++ b/2015/9xxx/CVE-2015-9429.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9429", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The yith-maintenance-mode plugin before 1.2.0 for WordPress has CSRF with resultant XSS via the wp-admin/themes.php?page=yith-maintenance-mode panel_page parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8285", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8285" + }, + { + "url": "https://wordpress.org/plugins/yith-maintenance-mode/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/yith-maintenance-mode/#developers" + }, + { + "url": "http://cinu.pl/research/wp-plugins/mail_3a14a77571c73684103e0f517a92d757.html", + "refsource": "MISC", + "name": "http://cinu.pl/research/wp-plugins/mail_3a14a77571c73684103e0f517a92d757.html" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9430.json b/2015/9xxx/CVE-2015-9430.json new file mode 100644 index 00000000000..3aa8dc1059b --- /dev/null +++ b/2015/9xxx/CVE-2015-9430.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9430", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The crazy-bone plugin before 0.6.0 for WordPress has XSS via the User-Agent HTTP header." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8281", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8281" + }, + { + "url": "https://wordpress.org/plugins/crazy-bone/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/crazy-bone/#developers" + }, + { + "url": "http://cinu.pl/research/wp-plugins/mail_e22c10161b1e2e4e54facf2d17e723c3.html", + "refsource": "MISC", + "name": "http://cinu.pl/research/wp-plugins/mail_e22c10161b1e2e4e54facf2d17e723c3.html" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9449.json b/2015/9xxx/CVE-2015-9449.json new file mode 100644 index 00000000000..91fd9223d4f --- /dev/null +++ b/2015/9xxx/CVE-2015-9449.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9449", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The microblog-poster plugin before 1.6.2 for WordPress has SQL Injection via the wp-admin/options-general.php?page=microblogposter.php account_id parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8321", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8321" + }, + { + "url": "https://wordpress.org/plugins/microblog-poster/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/microblog-poster/#developers" + }, + { + "url": "http://cinu.pl/research/wp-plugins/mail_642d8f7d8715d08f070a35b896f2d8bd.html", + "refsource": "MISC", + "name": "http://cinu.pl/research/wp-plugins/mail_642d8f7d8715d08f070a35b896f2d8bd.html" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16899.json b/2019/16xxx/CVE-2019-16899.json new file mode 100644 index 00000000000..9c4eb764ad1 --- /dev/null +++ b/2019/16xxx/CVE-2019-16899.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16899", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "In Advantech WebAccess/HMI Designer 2.1.9.31, Data from a Faulting Address controls Code Flow starting at PM_V3!CTagInfoThreadBase::GetNICInfo+0x0000000000512918." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html", + "refsource": "MISC", + "name": "http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16900.json b/2019/16xxx/CVE-2019-16900.json new file mode 100644 index 00000000000..a22fbab487b --- /dev/null +++ b/2019/16xxx/CVE-2019-16900.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16900", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Advantech WebAccess/HMI Designer 2.1.9.31 has a User Mode Write AV starting at MSVCR90!memcpy+0x000000000000015c." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html", + "refsource": "MISC", + "name": "http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16901.json b/2019/16xxx/CVE-2019-16901.json new file mode 100644 index 00000000000..d2ab6d8a740 --- /dev/null +++ b/2019/16xxx/CVE-2019-16901.json @@ -0,0 +1,62 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16901", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Advantech WebAccess/HMI Designer 2.1.9.31 has Exception Handler Chain corruption starting at Unknown Symbol @ 0x0000000000000000 called from ntdll!RtlRaiseStatus+0x00000000000000b4." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html", + "refsource": "MISC", + "name": "http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html" + } + ] + } +} \ No newline at end of file