diff --git a/2020/15xxx/CVE-2020-15228.json b/2020/15xxx/CVE-2020-15228.json index 2f71d36bfc9..b0095ca5d2f 100644 --- a/2020/15xxx/CVE-2020-15228.json +++ b/2020/15xxx/CVE-2020-15228.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "In the `@actions/core` npm module before version 1.2.6,`addPath` and `exportVariable` functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author. \n\nThe runner will release an update that disables the `set-env` and `add-path` workflow commands in the near future. For now, users should upgrade to `@actions/core v1.2.6` or later, and replace any instance of the `set-env` or `add-path` commands in their workflows with the new Environment File Syntax. Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution.\n" + "value": "In the `@actions/core` npm module before version 1.2.6,`addPath` and `exportVariable` functions communicate with the Actions Runner over stdout by generating a string in a specific format. Workflows that log untrusted data to stdout may invoke these commands, resulting in the path or environment variables being modified without the intention of the workflow or action author. The runner will release an update that disables the `set-env` and `add-path` workflow commands in the near future. For now, users should upgrade to `@actions/core v1.2.6` or later, and replace any instance of the `set-env` or `add-path` commands in their workflows with the new Environment File Syntax. Workflows and actions using the old commands or older versions of the toolkit will start to warn, then error out during workflow execution." } ] }, diff --git a/2020/25xxx/CVE-2020-25200.json b/2020/25xxx/CVE-2020-25200.json index 5b18def9132..65d2880314b 100644 --- a/2020/25xxx/CVE-2020-25200.json +++ b/2020/25xxx/CVE-2020-25200.json @@ -1,17 +1,71 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-25200", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-25200", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Pritunl 1.29.2145.25 allows attackers to enumerate valid VPN usernames via a series of /auth/session login attempts. Initially, the server will return error 401. However, if the username is valid, then after 20 login attempts, the server will start responding with error 400. Invalid usernames will receive error 401 indefinitely." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://pritunl.com", + "refsource": "MISC", + "name": "https://pritunl.com" + }, + { + "url": "https://pritunl.com/security", + "refsource": "MISC", + "name": "https://pritunl.com/security" + }, + { + "refsource": "MISC", + "name": "https://github.com/lukaszstu/pritunl/blob/master/CVE-2020-25200", + "url": "https://github.com/lukaszstu/pritunl/blob/master/CVE-2020-25200" } ] } diff --git a/2020/6xxx/CVE-2020-6506.json b/2020/6xxx/CVE-2020-6506.json index a3322c4eb4c..83b649182ed 100644 --- a/2020/6xxx/CVE-2020-6506.json +++ b/2020/6xxx/CVE-2020-6506.json @@ -69,6 +69,11 @@ "refsource": "MLIST", "name": "[cordova-issues] 20200929 [GitHub] [cordova-docs] purplecabbage merged pull request #1123: Added Security Advisory CVE-2020-6506", "url": "https://lists.apache.org/thread.html/r2769c33da7f7ece7e4e31837c1e1839d6657c7c13bb8d228670b8da0@%3Cissues.cordova.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[cordova-issues] 20201001 [GitHub] [cordova-docs] dpogue commented on issue #1022: Document warnings on using remote source for ", + "url": "https://lists.apache.org/thread.html/r1ab80f8591d5c2147898076e3945dad1c897513630aabec556883275@%3Cissues.cordova.apache.org%3E" } ] },