Skip to content

Commit

Permalink
"-Synchronized-Data."
Browse files Browse the repository at this point in the history
  • Loading branch information
cve-team committed Sep 26, 2019
1 parent 323ea5c commit e8e3e19
Show file tree
Hide file tree
Showing 17 changed files with 663 additions and 0 deletions.
67 changes: 67 additions & 0 deletions 2015/9xxx/CVE-2015-9440.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9440",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The monetize plugin through 1.03 for WordPress has CSRF with resultant XSS via wp-admin/admin.php?page=monetize-zones-new."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/monetize/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/monetize/#developers"
},
{
"url": "http://packetstormsecurity.com/files/133002/",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/133002/"
}
]
}
}
67 changes: 67 additions & 0 deletions 2015/9xxx/CVE-2015-9441.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9441",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The bookmarkify plugin 2.9.2 for WordPress has CSRF with resultant XSS via wp-admin/options-general.php?page=bookmarkify.php."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/bookmarkify/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/bookmarkify/#developers"
},
{
"url": "http://packetstormsecurity.com/files/133001/",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/133001/"
}
]
}
}
67 changes: 67 additions & 0 deletions 2015/9xxx/CVE-2015-9442.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9442",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The avenirsoft-directdownload plugin 1.0 for WordPress has CSRF with resultant XSS via wp-admin/admin.php?page=avenir_plugin."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/avenirsoft-directdownload/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/avenirsoft-directdownload/#developers"
},
{
"url": "http://packetstormsecurity.com/files/132992/",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/132992/"
}
]
}
}
67 changes: 67 additions & 0 deletions 2015/9xxx/CVE-2015-9443.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9443",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The accurate-form-data-real-time-form-validation plugin 1.2 for WordPress has CSRF with resultant XSS via wp-admin/options-general.php?page=Accu_Data_WP."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/accurate-form-data-real-time-form-validation/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/accurate-form-data-real-time-form-validation/#developers"
},
{
"url": "http://packetstormsecurity.com/files/132911/",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/132911/"
}
]
}
}
67 changes: 67 additions & 0 deletions 2015/9xxx/CVE-2015-9444.json
Original file line number Diff line number Diff line change
@@ -0,0 +1,67 @@
{
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2015-9444",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The altos-connect plugin 1.3.0 for WordPress has XSS via the wp-content/plugins/altos-connect/jquery-validate/demo/demo/captcha/index.php/ PATH_SELF."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"url": "https://wordpress.org/plugins/altos-connect/#developers",
"refsource": "MISC",
"name": "https://wordpress.org/plugins/altos-connect/#developers"
},
{
"url": "http://packetstormsecurity.com/files/132908/",
"refsource": "MISC",
"name": "http://packetstormsecurity.com/files/132908/"
}
]
}
}
Loading

0 comments on commit e8e3e19

Please sign in to comment.