From e8e3e19a91a5e1b8745956534c81fe7307ba2d1c Mon Sep 17 00:00:00 2001 From: CVE Team Date: Thu, 26 Sep 2019 04:00:56 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2015/9xxx/CVE-2015-9440.json | 67 +++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9441.json | 67 +++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9442.json | 67 +++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9443.json | 67 +++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9444.json | 67 +++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9445.json | 72 ++++++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9446.json | 72 ++++++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9447.json | 72 ++++++++++++++++++++++++++++++++++ 2015/9xxx/CVE-2015-9448.json | 72 ++++++++++++++++++++++++++++++++++ 2018/0xxx/CVE-2018-0732.json | 5 +++ 2018/0xxx/CVE-2018-0734.json | 5 +++ 2018/0xxx/CVE-2018-0737.json | 5 +++ 2019/14xxx/CVE-2019-14540.json | 5 +++ 2019/1xxx/CVE-2019-1543.json | 5 +++ 2019/1xxx/CVE-2019-1552.json | 5 +++ 2019/1xxx/CVE-2019-1559.json | 5 +++ 2019/5xxx/CVE-2019-5477.json | 5 +++ 17 files changed, 663 insertions(+) create mode 100644 2015/9xxx/CVE-2015-9440.json create mode 100644 2015/9xxx/CVE-2015-9441.json create mode 100644 2015/9xxx/CVE-2015-9442.json create mode 100644 2015/9xxx/CVE-2015-9443.json create mode 100644 2015/9xxx/CVE-2015-9444.json create mode 100644 2015/9xxx/CVE-2015-9445.json create mode 100644 2015/9xxx/CVE-2015-9446.json create mode 100644 2015/9xxx/CVE-2015-9447.json create mode 100644 2015/9xxx/CVE-2015-9448.json diff --git a/2015/9xxx/CVE-2015-9440.json b/2015/9xxx/CVE-2015-9440.json new file mode 100644 index 000000000000..ed7eab534a53 --- /dev/null +++ b/2015/9xxx/CVE-2015-9440.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9440", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The monetize plugin through 1.03 for WordPress has CSRF with resultant XSS via wp-admin/admin.php?page=monetize-zones-new." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/monetize/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/monetize/#developers" + }, + { + "url": "http://packetstormsecurity.com/files/133002/", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/133002/" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9441.json b/2015/9xxx/CVE-2015-9441.json new file mode 100644 index 000000000000..e253539fefe7 --- /dev/null +++ b/2015/9xxx/CVE-2015-9441.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9441", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The bookmarkify plugin 2.9.2 for WordPress has CSRF with resultant XSS via wp-admin/options-general.php?page=bookmarkify.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/bookmarkify/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/bookmarkify/#developers" + }, + { + "url": "http://packetstormsecurity.com/files/133001/", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/133001/" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9442.json b/2015/9xxx/CVE-2015-9442.json new file mode 100644 index 000000000000..bf0b7f1f8b6c --- /dev/null +++ b/2015/9xxx/CVE-2015-9442.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9442", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The avenirsoft-directdownload plugin 1.0 for WordPress has CSRF with resultant XSS via wp-admin/admin.php?page=avenir_plugin." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/avenirsoft-directdownload/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/avenirsoft-directdownload/#developers" + }, + { + "url": "http://packetstormsecurity.com/files/132992/", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/132992/" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9443.json b/2015/9xxx/CVE-2015-9443.json new file mode 100644 index 000000000000..0ae264cbda44 --- /dev/null +++ b/2015/9xxx/CVE-2015-9443.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9443", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The accurate-form-data-real-time-form-validation plugin 1.2 for WordPress has CSRF with resultant XSS via wp-admin/options-general.php?page=Accu_Data_WP." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/accurate-form-data-real-time-form-validation/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/accurate-form-data-real-time-form-validation/#developers" + }, + { + "url": "http://packetstormsecurity.com/files/132911/", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/132911/" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9444.json b/2015/9xxx/CVE-2015-9444.json new file mode 100644 index 000000000000..b1deb0dd47c9 --- /dev/null +++ b/2015/9xxx/CVE-2015-9444.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9444", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The altos-connect plugin 1.3.0 for WordPress has XSS via the wp-content/plugins/altos-connect/jquery-validate/demo/demo/captcha/index.php/ PATH_SELF." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wordpress.org/plugins/altos-connect/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/altos-connect/#developers" + }, + { + "url": "http://packetstormsecurity.com/files/132908/", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/132908/" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9445.json b/2015/9xxx/CVE-2015-9445.json new file mode 100644 index 000000000000..4294344e9323 --- /dev/null +++ b/2015/9xxx/CVE-2015-9445.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9445", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The unite-gallery-lite plugin before 1.5 for WordPress has CSRF and SQL injection via wp-admin/admin-ajax.php in a unitegallery_ajax_action operation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8113", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8113" + }, + { + "url": "https://wordpress.org/plugins/unite-gallery-lite/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/unite-gallery-lite/#developers" + }, + { + "url": "http://packetstormsecurity.com/files/132842/", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/132842/" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9446.json b/2015/9xxx/CVE-2015-9446.json new file mode 100644 index 000000000000..000f624ff579 --- /dev/null +++ b/2015/9xxx/CVE-2015-9446.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9446", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The unite-gallery-lite plugin before 1.5 for WordPress has SQL injection via data[galleryID] to wp-admin/admin-ajax.php." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8113", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8113" + }, + { + "url": "https://wordpress.org/plugins/unite-gallery-lite/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/unite-gallery-lite/#developers" + }, + { + "url": "http://packetstormsecurity.com/files/132842/", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/132842/" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9447.json b/2015/9xxx/CVE-2015-9447.json new file mode 100644 index 000000000000..95e30b05f35c --- /dev/null +++ b/2015/9xxx/CVE-2015-9447.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9447", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The unite-gallery-lite plugin before 1.5 for WordPress has CSRF and SQL injection via wp-admin/admin.php galleryid or id parameters." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8113", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8113" + }, + { + "url": "https://wordpress.org/plugins/unite-gallery-lite/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/unite-gallery-lite/#developers" + }, + { + "url": "http://packetstormsecurity.com/files/132842/", + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/132842/" + } + ] + } +} \ No newline at end of file diff --git a/2015/9xxx/CVE-2015-9448.json b/2015/9xxx/CVE-2015-9448.json new file mode 100644 index 000000000000..3caf43f05364 --- /dev/null +++ b/2015/9xxx/CVE-2015-9448.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2015-9448", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "The sendpress plugin before 1.2 for WordPress has SQL Injection via the wp-admin/admin.php?page=sp-queue listid parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://wpvulndb.com/vulnerabilities/8324", + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/8324" + }, + { + "url": "https://wordpress.org/plugins/sendpress/#developers", + "refsource": "MISC", + "name": "https://wordpress.org/plugins/sendpress/#developers" + }, + { + "url": "http://cinu.pl/research/wp-plugins/mail_8a2f7613577ea8e613ec274aeec14527.html", + "refsource": "MISC", + "name": "http://cinu.pl/research/wp-plugins/mail_8a2f7613577ea8e613ec274aeec14527.html" + } + ] + } +} \ No newline at end of file diff --git a/2018/0xxx/CVE-2018-0732.json b/2018/0xxx/CVE-2018-0732.json index 0c370e7c0bbe..3a5a3963023e 100644 --- a/2018/0xxx/CVE-2018-0732.json +++ b/2018/0xxx/CVE-2018-0732.json @@ -229,6 +229,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-00c25b9379", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-9a0a7c0986", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/" } ] } diff --git a/2018/0xxx/CVE-2018-0734.json b/2018/0xxx/CVE-2018-0734.json index a8ac3880cb57..0c053abf8193 100644 --- a/2018/0xxx/CVE-2018-0734.json +++ b/2018/0xxx/CVE-2018-0734.json @@ -182,6 +182,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-00c25b9379", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-9a0a7c0986", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/" } ] } diff --git a/2018/0xxx/CVE-2018-0737.json b/2018/0xxx/CVE-2018-0737.json index ff6dafa52c1f..8aec09b99248 100644 --- a/2018/0xxx/CVE-2018-0737.json +++ b/2018/0xxx/CVE-2018-0737.json @@ -209,6 +209,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-00c25b9379", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-9a0a7c0986", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/" } ] } diff --git a/2019/14xxx/CVE-2019-14540.json b/2019/14xxx/CVE-2019-14540.json index 3893fb2f3bfa..7fa8dcc91d1f 100644 --- a/2019/14xxx/CVE-2019-14540.json +++ b/2019/14xxx/CVE-2019-14540.json @@ -76,6 +76,11 @@ "refsource": "MLIST", "name": "[hbase-issues] 20190925 [GitHub] [hbase] SteNicholas opened a new pull request #660: HBASE-23075 Upgrade jackson version", "url": "https://lists.apache.org/thread.html/40c00861b53bb611dee7d6f35f864aa7d1c1bd77df28db597cbf27e1@%3Cissues.hbase.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[zookeeper-notifications] 20190925 [GitHub] [zookeeper] maoling commented on issue #1097: ZOOKEEPER-3559 - Update Jackson to 2.9.10", + "url": "https://lists.apache.org/thread.html/a4f2c9fb36642a48912cdec6836ec00e497427717c5d377f8d7ccce6@%3Cnotifications.zookeeper.apache.org%3E" } ] } diff --git a/2019/1xxx/CVE-2019-1543.json b/2019/1xxx/CVE-2019-1543.json index 3b21575f7b3e..e21753b7a1a2 100644 --- a/2019/1xxx/CVE-2019-1543.json +++ b/2019/1xxx/CVE-2019-1543.json @@ -109,6 +109,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-00c25b9379", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-9a0a7c0986", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/" } ] } diff --git a/2019/1xxx/CVE-2019-1552.json b/2019/1xxx/CVE-2019-1552.json index 78aa04c32337..00066f32afa1 100644 --- a/2019/1xxx/CVE-2019-1552.json +++ b/2019/1xxx/CVE-2019-1552.json @@ -112,6 +112,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-00c25b9379", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-9a0a7c0986", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/" } ] } diff --git a/2019/1xxx/CVE-2019-1559.json b/2019/1xxx/CVE-2019-1559.json index de5d53ff0c4c..432f85328316 100644 --- a/2019/1xxx/CVE-2019-1559.json +++ b/2019/1xxx/CVE-2019-1559.json @@ -206,6 +206,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-00c25b9379", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZBEV5QGDRFUZDMNECFXUSN5FMYOZDE4V/" + }, + { + "refsource": "FEDORA", + "name": "FEDORA-2019-9a0a7c0986", + "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/Y3IVFGSERAZLNJCK35TEM2R4726XIH3Z/" } ] } diff --git a/2019/5xxx/CVE-2019-5477.json b/2019/5xxx/CVE-2019-5477.json index 1a0e8b23021e..0f3aa19bf362 100644 --- a/2019/5xxx/CVE-2019-5477.json +++ b/2019/5xxx/CVE-2019-5477.json @@ -58,6 +58,11 @@ "refsource": "CONFIRM", "name": "https://github.com/sparklemotion/nokogiri/issues/1915", "url": "https://github.com/sparklemotion/nokogiri/issues/1915" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20190926 [SECURITY] [DLA 1933-1] ruby-nokogiri security update", + "url": "https://lists.debian.org/debian-lts-announce/2019/09/msg00027.html" } ] },