diff --git a/2019/17xxx/CVE-2019-17177.json b/2019/17xxx/CVE-2019-17177.json index 67367db0945..fb4d0945610 100644 --- a/2019/17xxx/CVE-2019-17177.json +++ b/2019/17xxx/CVE-2019-17177.json @@ -57,11 +57,6 @@ "refsource": "MISC", "name": "https://github.com/FreeRDP/FreeRDP/issues/5645" }, - { - "url": "https://github.com/akallabeth/FreeRDP/commit/fc80ab45621bd966f70594c0b7393ec005a94007", - "refsource": "MISC", - "name": "https://github.com/akallabeth/FreeRDP/commit/fc80ab45621bd966f70594c0b7393ec005a94007" - }, { "refsource": "SUSE", "name": "openSUSE-SU-2019:2604", @@ -81,6 +76,11 @@ "refsource": "UBUNTU", "name": "USN-4379-1", "url": "https://usn.ubuntu.com/4379-1/" + }, + { + "refsource": "MISC", + "name": "https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a", + "url": "https://github.com/FreeRDP/FreeRDP/commit/9fee4ae076b1ec97b97efb79ece08d1dab4df29a" } ] } diff --git a/2019/17xxx/CVE-2019-17498.json b/2019/17xxx/CVE-2019-17498.json index cdfe52fe8d9..219d6ff7d27 100644 --- a/2019/17xxx/CVE-2019-17498.json +++ b/2019/17xxx/CVE-2019-17498.json @@ -57,11 +57,6 @@ "refsource": "MISC", "name": "https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480" }, - { - "url": "https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94", - "refsource": "MISC", - "name": "https://github.com/libssh2/libssh2/pull/402/commits/1c6fa92b77e34d089493fe6d3e2c6c8775858b94" - }, { "refsource": "MISC", "name": "https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/", @@ -91,6 +86,11 @@ "refsource": "FEDORA", "name": "FEDORA-2019-ec04c34768", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/22H4Q5XMGS3QNSA7OCL3U7UQZ4NXMR5O/" + }, + { + "refsource": "MISC", + "name": "https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c", + "url": "https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c" } ] } diff --git a/2019/19xxx/CVE-2019-19589.json b/2019/19xxx/CVE-2019-19589.json index 073d3343368..469641e6a9a 100644 --- a/2019/19xxx/CVE-2019-19589.json +++ b/2019/19xxx/CVE-2019-19589.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "The Lever PDF Embedder plugin 4.4 for WordPress does not block the distribution of polyglot PDF documents that are valid JAR archives." + "value": "** DISPUTED ** The Lever PDF Embedder plugin 4.4 for WordPress does not block the distribution of polyglot PDF documents that are valid JAR archives. Note: It has been argued that \"The vulnerability reported in PDF Embedder Plugin is not valid as the plugin itself doesn't control or manage the file upload process. It only serves the uploaded PDF files and the responsibility of uploading PDF file remains with the Site owner of Wordpress installation, the upload of PDF file is managed by Wordpress core and not by PDF Embedder Plugin. Control & block of polyglot file is required to be taken care at the time of upload, not on showing the file. Moreover, the reference mentions retrieving the files from the browser cache and manually renaming it to jar for executing the file. That refers to a two step non-connected steps which has nothing to do with PDF Embedder.\"" } ] }, diff --git a/2020/15xxx/CVE-2020-15242.json b/2020/15xxx/CVE-2020-15242.json index 9ff602d6718..9f19ad2980a 100644 --- a/2020/15xxx/CVE-2020-15242.json +++ b/2020/15xxx/CVE-2020-15242.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "Next.js versions >=9.5.0 and <9.5.4 are vulnerable to an Open Redirect. Specially encoded paths could be used with the trailing slash redirect to allow an open redirect to occur to an external site.\n\nIn general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attackers domain from a trusted domain. The issue is fixed in version 9.5.4." + "value": "Next.js versions >=9.5.0 and <9.5.4 are vulnerable to an Open Redirect. Specially encoded paths could be used with the trailing slash redirect to allow an open redirect to occur to an external site. In general, this redirect does not directly harm users although can allow for phishing attacks by redirecting to an attackers domain from a trusted domain. The issue is fixed in version 9.5.4." } ] }, diff --git a/2020/26xxx/CVE-2020-26893.json b/2020/26xxx/CVE-2020-26893.json new file mode 100644 index 00000000000..9e4b3261aed --- /dev/null +++ b/2020/26xxx/CVE-2020-26893.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-26893", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/7xxx/CVE-2020-7676.json b/2020/7xxx/CVE-2020-7676.json index 2a4bc39c3f2..086769f9691 100644 --- a/2020/7xxx/CVE-2020-7676.json +++ b/2020/7xxx/CVE-2020-7676.json @@ -83,6 +83,21 @@ "refsource": "MLIST", "name": "[hadoop-ozone-issues] 20201007 [GitHub] [hadoop-ozone] vivekratnavel commented on pull request #1481: HDDS-4316. Upgrade to angular 1.8.0 due to CVE-2020-7676", "url": "https://lists.apache.org/thread.html/r455ebd83a1c69ae8fd897560534a079c70a483dbe1e75504f1ca499b@%3Cozone-issues.hadoop.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hadoop-ozone-issues] 20201008 [jira] [Updated] (HDDS-4316) Upgrade to angular 1.8.0 due to CVE-2020-7676", + "url": "https://lists.apache.org/thread.html/rb6423268b25db0f800359986867648e11dbd38e133b9383e85067f02@%3Cozone-issues.hadoop.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hadoop-ozone-commits] 20201008 [hadoop-ozone] branch master updated: HDDS-4316. Upgrade to angular 1.8.0 due to CVE-2020-7676 (#1481)", + "url": "https://lists.apache.org/thread.html/r80f210a5f4833d59c5d3de17dd7312f9daba0765ec7d4052469f13f1@%3Cozone-commits.hadoop.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[hadoop-ozone-issues] 20201008 [GitHub] [hadoop-ozone] adoroszlai merged pull request #1481: HDDS-4316. Upgrade to angular 1.8.0 due to CVE-2020-7676", + "url": "https://lists.apache.org/thread.html/r446c297cd6cda2bd7e345c9b0741d7f611df89902e5d515848c6f4b1@%3Cozone-issues.hadoop.apache.org%3E" } ] },