"-Synchronized-Data."

This commit is contained in:
CVE Team 2019-09-26 01:00:52 +00:00
parent f972d958da
commit d82ad7ef64
No known key found for this signature in database
GPG Key ID: 0DA1F9F56BC892E8
16 changed files with 1117 additions and 0 deletions

View File

@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9419",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The captain-slider plugin 1.0.6 for WordPress has XSS via a Title or Caption section."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/captain-slider/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/captain-slider/#developers"
},
{
"url": "https://packetstormsecurity.com/files/133362/",
"refsource": "MISC",
"name": "https://packetstormsecurity.com/files/133362/"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9420",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The soundcloud-is-gold plugin before 2.3.2 for WordPress has XSS via the wp-admin/admin-ajax.php?action=get_soundcloud_player id parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wpvulndb.com/vulnerabilities/8306",
"refsource": "MISC",
"name": "https://wpvulndb.com/vulnerabilities/8306"
},
{
"url": "https://wordpress.org/plugins/soundcloud-is-gold/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/soundcloud-is-gold/#developers"
},
{
"url": "http://cinu.pl/research/wp-plugins/mail_9acbc3ef2dd43bfb78b6b3dcf6c5ef01.html",
"refsource": "MISC",
"name": "http://cinu.pl/research/wp-plugins/mail_9acbc3ef2dd43bfb78b6b3dcf6c5ef01.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9421",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The olevmedia-shortcodes plugin before 1.1.9 for WordPress has CSRF with resultant XSS via the wp-admin/admin-ajax.php?action=omsc_popup id parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wpvulndb.com/vulnerabilities/8338",
"refsource": "MISC",
"name": "https://wpvulndb.com/vulnerabilities/8338"
},
{
"url": "https://wordpress.org/plugins/olevmedia-shortcodes/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/olevmedia-shortcodes/#developers"
},
{
"url": "http://cinu.pl/research/wp-plugins/mail_d9e466122cd9a6ca27db840cca277cdb.html",
"refsource": "MISC",
"name": "http://cinu.pl/research/wp-plugins/mail_d9e466122cd9a6ca27db840cca277cdb.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9422",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The PlugNedit Adaptive Editor plugin before 6.2.0 for WordPress has CSRF with resultant XSS via wp-admin/admin-ajax.php?action=simple_fields_field_type_post_dialog_load plugnedit_width, pnemedcount, PlugneditBGColor, PlugneditEditorMargin, or plugneditcontent parameters."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wpvulndb.com/vulnerabilities/8331",
"refsource": "MISC",
"name": "https://wpvulndb.com/vulnerabilities/8331"
},
{
"url": "https://wordpress.org/plugins/plugnedit/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/plugnedit/#developers"
},
{
"url": "http://cinu.pl/research/wp-plugins/mail_b5405e735cb605b2fd1a300bb8be4860.html",
"refsource": "MISC",
"name": "http://cinu.pl/research/wp-plugins/mail_b5405e735cb605b2fd1a300bb8be4860.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9423",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The PlugNedit Adaptive Editor plugin before 6.2.0 for WordPress has XSS via wp-admin/admin-ajax.php?action=simple_fields_field_type_post_dialog_load PlugneditBGColor, PlugneditEditorMargin, plugnedit_width, pnemedcount, or plugneditcontent parameters."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wpvulndb.com/vulnerabilities/8331",
"refsource": "MISC",
"name": "https://wpvulndb.com/vulnerabilities/8331"
},
{
"url": "https://wordpress.org/plugins/plugnedit/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/plugnedit/#developers"
},
{
"url": "http://cinu.pl/research/wp-plugins/mail_b5405e735cb605b2fd1a300bb8be4860.html",
"refsource": "MISC",
"name": "http://cinu.pl/research/wp-plugins/mail_b5405e735cb605b2fd1a300bb8be4860.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9424",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The multicons plugin before 3.0 for WordPress has CSRF with resultant XSS via the wp-admin/options-general.php?page=multicons%2Fmulticons.php global_url or admin_url parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wpvulndb.com/vulnerabilities/8330",
"refsource": "MISC",
"name": "https://wpvulndb.com/vulnerabilities/8330"
},
{
"url": "https://wordpress.org/plugins/multicons/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/multicons/#developers"
},
{
"url": "http://cinu.pl/research/wp-plugins/mail_aea47a98ad3088dbb33528ded8e1b124.html",
"refsource": "MISC",
"name": "http://cinu.pl/research/wp-plugins/mail_aea47a98ad3088dbb33528ded8e1b124.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9425",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The social-locker plugin before 4.2.5 for WordPress has CSRF with resultant XSS via the wp-admin/edit.php?post_type=opanda-item&page=license-manager-sociallocker-next licensekey parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wpvulndb.com/vulnerabilities/8327",
"refsource": "MISC",
"name": "https://wpvulndb.com/vulnerabilities/8327"
},
{
"url": "https://wordpress.org/plugins/social-locker/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/social-locker/#developers"
},
{
"url": "http://cinu.pl/research/wp-plugins/mail_9e26c6f71bf8467e4a5017b15d5acddc.html",
"refsource": "MISC",
"name": "http://cinu.pl/research/wp-plugins/mail_9e26c6f71bf8467e4a5017b15d5acddc.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9426",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The manual-image-crop plugin before 1.11 for WordPress has CSRF with resultant XSS via the wp-admin/admin-ajax.php?action=mic_editor_window postId parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wpvulndb.com/vulnerabilities/8297",
"refsource": "MISC",
"name": "https://wpvulndb.com/vulnerabilities/8297"
},
{
"url": "https://wordpress.org/plugins/manual-image-crop/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/manual-image-crop/#developers"
},
{
"url": "http://cinu.pl/research/wp-plugins/mail_7c87194ce1dcf0642135d17a71ed91cd.html",
"refsource": "MISC",
"name": "http://cinu.pl/research/wp-plugins/mail_7c87194ce1dcf0642135d17a71ed91cd.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9427",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The googmonify plugin through 0.5.1 for WordPress has CSRF with resultant XSS via the wp-admin/options-general.php?page=googmonify.php PID or AID parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wpvulndb.com/vulnerabilities/8158",
"refsource": "MISC",
"name": "https://wpvulndb.com/vulnerabilities/8158"
},
{
"url": "https://wordpress.org/plugins/googmonify/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/googmonify/#developers"
},
{
"url": "http://packetstormsecurity.com/files/133267/",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/133267/"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9428",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The wplegalpages plugin before 1.1 for WordPress has CSRF with resultant XSS via wp-admin/admin.php?page=legal-pages lp-domain-name, lp-business-name, lp-phone, lp-street, lp-city-state, lp-country, lp-email, lp-address, or lp-niche parameters."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wpvulndb.com/vulnerabilities/8291",
"refsource": "MISC",
"name": "https://wpvulndb.com/vulnerabilities/8291"
},
{
"url": "https://wordpress.org/plugins/wplegalpages/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/wplegalpages/#developers"
},
{
"url": "http://cinu.pl/research/wp-plugins/mail_4e7cf11876edb93517405b69cb033741.html",
"refsource": "MISC",
"name": "http://cinu.pl/research/wp-plugins/mail_4e7cf11876edb93517405b69cb033741.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9429",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The yith-maintenance-mode plugin before 1.2.0 for WordPress has CSRF with resultant XSS via the wp-admin/themes.php?page=yith-maintenance-mode panel_page parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wpvulndb.com/vulnerabilities/8285",
"refsource": "MISC",
"name": "https://wpvulndb.com/vulnerabilities/8285"
},
{
"url": "https://wordpress.org/plugins/yith-maintenance-mode/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/yith-maintenance-mode/#developers"
},
{
"url": "http://cinu.pl/research/wp-plugins/mail_3a14a77571c73684103e0f517a92d757.html",
"refsource": "MISC",
"name": "http://cinu.pl/research/wp-plugins/mail_3a14a77571c73684103e0f517a92d757.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9430",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The crazy-bone plugin before 0.6.0 for WordPress has XSS via the User-Agent HTTP header."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wpvulndb.com/vulnerabilities/8281",
"refsource": "MISC",
"name": "https://wpvulndb.com/vulnerabilities/8281"
},
{
"url": "https://wordpress.org/plugins/crazy-bone/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/crazy-bone/#developers"
},
{
"url": "http://cinu.pl/research/wp-plugins/mail_e22c10161b1e2e4e54facf2d17e723c3.html",
"refsource": "MISC",
"name": "http://cinu.pl/research/wp-plugins/mail_e22c10161b1e2e4e54facf2d17e723c3.html"
}
]
}
}

View File

@ -0,0 +1,72 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9449",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The microblog-poster plugin before 1.6.2 for WordPress has SQL Injection via the wp-admin/options-general.php?page=microblogposter.php account_id parameter."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wpvulndb.com/vulnerabilities/8321",
"refsource": "MISC",
"name": "https://wpvulndb.com/vulnerabilities/8321"
},
{
"url": "https://wordpress.org/plugins/microblog-poster/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/microblog-poster/#developers"
},
{
"url": "http://cinu.pl/research/wp-plugins/mail_642d8f7d8715d08f070a35b896f2d8bd.html",
"refsource": "MISC",
"name": "http://cinu.pl/research/wp-plugins/mail_642d8f7d8715d08f070a35b896f2d8bd.html"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16899",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "In Advantech WebAccess/HMI Designer 2.1.9.31, Data from a Faulting Address controls Code Flow starting at PM_V3!CTagInfoThreadBase::GetNICInfo+0x0000000000512918."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html",
"refsource": "MISC",
"name": "http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16900",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Advantech WebAccess/HMI Designer 2.1.9.31 has a User Mode Write AV starting at MSVCR90!memcpy+0x000000000000015c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html",
"refsource": "MISC",
"name": "http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html"
}
]
}
}

View File

@ -0,0 +1,62 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2019-16901",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Advantech WebAccess/HMI Designer 2.1.9.31 has Exception Handler Chain corruption starting at Unknown Symbol @ 0x0000000000000000 called from ntdll!RtlRaiseStatus+0x00000000000000b4."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html",
"refsource": "MISC",
"name": "http://code610.blogspot.com/2019/09/crashing-webaccesshmi-designer-21931.html"
}
]
}
}