diff --git a/2020/8xxx/CVE-2020-8813.json b/2020/8xxx/CVE-2020-8813.json index 55eada248f1..c3fe9af4994 100644 --- a/2020/8xxx/CVE-2020-8813.json +++ b/2020/8xxx/CVE-2020-8813.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/", "url": "https://shells.systems/cacti-v1-2-8-authenticated-remote-code-execution-cve-2020-8813/" + }, + { + "refsource": "CONFIRM", + "name": "https://github.com/Cacti/cacti/issues/3285", + "url": "https://github.com/Cacti/cacti/issues/3285" } ] } diff --git a/2020/9xxx/CVE-2020-9008.json b/2020/9xxx/CVE-2020-9008.json index 829d1433cb0..f7039678470 100644 --- a/2020/9xxx/CVE-2020-9008.json +++ b/2020/9xxx/CVE-2020-9008.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-9008", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-9008", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Stored Cross-site scripting (XSS) vulnerability in Blackboard Learn/PeopleTool v9.1 allows users to inject arbitrary web script via the Tile widget in the People Tool profile editor." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://blackboard.com", + "refsource": "MISC", + "name": "https://blackboard.com" + }, + { + "refsource": "MISC", + "name": "https://github.com/kyletimmermans/blackboard-xss/blob/master/CVE-2020-9008.md", + "url": "https://github.com/kyletimmermans/blackboard-xss/blob/master/CVE-2020-9008.md" } ] } diff --git a/2020/9xxx/CVE-2020-9018.json b/2020/9xxx/CVE-2020-9018.json index 1d441eb8aa3..57c60ff9de5 100644 --- a/2020/9xxx/CVE-2020-9018.json +++ b/2020/9xxx/CVE-2020-9018.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-9018", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-9018", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "LiteCart through 2.2.1 allows admin/?app=users&doc=edit_user CSRF to add a user." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://uploadboy.com/7njf43f167is/384/mp4", + "refsource": "MISC", + "name": "https://uploadboy.com/7njf43f167is/384/mp4" + }, + { + "refsource": "MISC", + "name": "https://cert.ikiu.ac.ir/public-files/pages/attachments/11/5a8ed1c216e1a910e413535207563845.pdf", + "url": "https://cert.ikiu.ac.ir/public-files/pages/attachments/11/5a8ed1c216e1a910e413535207563845.pdf" } ] } diff --git a/2020/9xxx/CVE-2020-9019.json b/2020/9xxx/CVE-2020-9019.json index 06adece3450..a33a3129c60 100644 --- a/2020/9xxx/CVE-2020-9019.json +++ b/2020/9xxx/CVE-2020-9019.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2020-9019", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2020-9019", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "The WPJobBoard plugin 5.5.3 for WordPress allows Persistent XSS via the Add Job form, as demonstrated by title and Description." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://uploadboy.com/uhxq91nuxd6d/423/mp4", + "refsource": "MISC", + "name": "https://uploadboy.com/uhxq91nuxd6d/423/mp4" + }, + { + "refsource": "MISC", + "name": "https://cert.ikiu.ac.ir/public-files/pages/attachments/11/a1f0e3e5aa9ba583298d03758b8ae95c.pdf", + "url": "https://cert.ikiu.ac.ir/public-files/pages/attachments/11/a1f0e3e5aa9ba583298d03758b8ae95c.pdf" } ] } diff --git a/2020/9xxx/CVE-2020-9386.json b/2020/9xxx/CVE-2020-9386.json new file mode 100644 index 00000000000..20fe81b2d6c --- /dev/null +++ b/2020/9xxx/CVE-2020-9386.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-9386", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/9xxx/CVE-2020-9387.json b/2020/9xxx/CVE-2020-9387.json new file mode 100644 index 00000000000..8c92772fd6a --- /dev/null +++ b/2020/9xxx/CVE-2020-9387.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-9387", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/9xxx/CVE-2020-9388.json b/2020/9xxx/CVE-2020-9388.json new file mode 100644 index 00000000000..00d7952f4f3 --- /dev/null +++ b/2020/9xxx/CVE-2020-9388.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-9388", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/9xxx/CVE-2020-9389.json b/2020/9xxx/CVE-2020-9389.json new file mode 100644 index 00000000000..3b98d397088 --- /dev/null +++ b/2020/9xxx/CVE-2020-9389.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-9389", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/9xxx/CVE-2020-9390.json b/2020/9xxx/CVE-2020-9390.json new file mode 100644 index 00000000000..11ee07c1cde --- /dev/null +++ b/2020/9xxx/CVE-2020-9390.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-9390", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/9xxx/CVE-2020-9391.json b/2020/9xxx/CVE-2020-9391.json new file mode 100644 index 00000000000..843be977282 --- /dev/null +++ b/2020/9xxx/CVE-2020-9391.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-9391", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been observed to cause heap corruption with the GNU C Library malloc implementation." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dcde237319e626d1ec3c9d8b7613032f0fd4663a", + "refsource": "MISC", + "name": "https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dcde237319e626d1ec3c9d8b7613032f0fd4663a" + }, + { + "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1797052", + "refsource": "MISC", + "name": "https://bugzilla.redhat.com/show_bug.cgi?id=1797052" + } + ] + } +} \ No newline at end of file