diff --git a/2018/11xxx/CVE-2018-11695.json b/2018/11xxx/CVE-2018-11695.json index 63a264fcf75..66234ab20e8 100644 --- a/2018/11xxx/CVE-2018-11695.json +++ b/2018/11xxx/CVE-2018-11695.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "An issue was discovered in LibSass through 3.5.2. A NULL pointer dereference was found in the function Sass::Expand::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact." + "value": "An issue was discovered in LibSass <3.5.3. A NULL pointer dereference was found in the function Sass::Expand::operator which could be leveraged by an attacker to cause a denial of service (application crash) or possibly have unspecified other impact." } ] }, @@ -61,6 +61,11 @@ "refsource": "MISC", "name": "https://github.com/sass/libsass/releases", "url": "https://github.com/sass/libsass/releases" + }, + { + "refsource": "MISC", + "name": "https://github.com/sass/libsass/pull/2631", + "url": "https://github.com/sass/libsass/pull/2631" } ] } diff --git a/2020/15xxx/CVE-2020-15712.json b/2020/15xxx/CVE-2020-15712.json index 8214fb47b71..11c14f6715c 100644 --- a/2020/15xxx/CVE-2020-15712.json +++ b/2020/15xxx/CVE-2020-15712.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-15712", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-15712", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "rConfig 3.9.5 could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a crafted request to the ajaxGetFileByPath.php script containing hexadecimal encoded \"dot dot\" sequences (%2f..%2f) in the path parameter to view arbitrary files on the system." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/184938", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/184938" + }, + { + "refsource": "MISC", + "name": "https://www.rconfig.com/downloads/v3-release-notes", + "url": "https://www.rconfig.com/downloads/v3-release-notes" } ] } diff --git a/2020/15xxx/CVE-2020-15713.json b/2020/15xxx/CVE-2020-15713.json index fb58a42767a..6f3dbbd99de 100644 --- a/2020/15xxx/CVE-2020-15713.json +++ b/2020/15xxx/CVE-2020-15713.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-15713", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-15713", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "rConfig 3.9.5 is vulnerable to SQL injection. A remote authenticated attacker could send crafted SQL statements to the devices.php script using the sortBy parameter, which could allow the attacker to view, add, modify, or delete information in the back-end database." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/184939", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/184939" + }, + { + "refsource": "MISC", + "name": "https://www.rconfig.com/downloads/v3-release-notes", + "url": "https://www.rconfig.com/downloads/v3-release-notes" } ] } diff --git a/2020/15xxx/CVE-2020-15714.json b/2020/15xxx/CVE-2020-15714.json index 7791c3bccde..67fad6fbc20 100644 --- a/2020/15xxx/CVE-2020-15714.json +++ b/2020/15xxx/CVE-2020-15714.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-15714", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-15714", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "rConfig 3.9.5 is vulnerable to SQL injection. A remote authenticated attacker could send crafted SQL statements to the devices.crud.php script using the custom_Location parameter, which could allow the attacker to view, add, modify, or delete information in the back-end database." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/184940", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/184940" + }, + { + "refsource": "MISC", + "name": "https://www.rconfig.com/downloads/v3-release-notes", + "url": "https://www.rconfig.com/downloads/v3-release-notes" } ] } diff --git a/2020/15xxx/CVE-2020-15715.json b/2020/15xxx/CVE-2020-15715.json index f9c3aa5f6a9..fab5038a3f7 100644 --- a/2020/15xxx/CVE-2020-15715.json +++ b/2020/15xxx/CVE-2020-15715.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-15715", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-15715", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "rConfig 3.9.5 could allow a remote authenticated attacker to execute arbitrary code on the system, because of an error in the search.crud.php script. An attacker could exploit this vulnerability using the nodeId parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/184941", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/184941" + }, + { + "refsource": "MISC", + "name": "https://www.rconfig.com/downloads/v3-release-notes", + "url": "https://www.rconfig.com/downloads/v3-release-notes" } ] }