diff --git a/2007/6xxx/CVE-2007-6758.json b/2007/6xxx/CVE-2007-6758.json index 9db6272db84..56476545e57 100644 --- a/2007/6xxx/CVE-2007-6758.json +++ b/2007/6xxx/CVE-2007-6758.json @@ -2,7 +2,30 @@ "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6758", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "Server-side request forgery (SSRF) vulnerability in feed-proxy.php in extjs 5.0.0." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://cxsecurity.com/issue/WLB-2015050162", + "refsource": "MISC", + "name": "http://cxsecurity.com/issue/WLB-2015050162" + }, + { + "refsource": "MISC", + "name": "http://attrition.org/pipermail/vim/2007-April/001545.html", + "url": "http://attrition.org/pipermail/vim/2007-April/001545.html" } ] } diff --git a/2010/3xxx/CVE-2010-3295.json b/2010/3xxx/CVE-2010-3295.json index 92254b5296c..08280ad0f6a 100644 --- a/2010/3xxx/CVE-2010-3295.json +++ b/2010/3xxx/CVE-2010-3295.json @@ -1,17 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2010-3295", - "STATE": "RESERVED" - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2010-3295", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none." } ] } diff --git a/2019/18xxx/CVE-2019-18899.json b/2019/18xxx/CVE-2019-18899.json index ff1355aad3b..a629799d79f 100644 --- a/2019/18xxx/CVE-2019-18899.json +++ b/2019/18xxx/CVE-2019-18899.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.de", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2020-01-20T00:00:00.000Z", "ID": "CVE-2019-18899", "STATE": "PUBLIC", @@ -44,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "The apt-cacher-ng package of openSUSE Leap 15.1 runs operations in user owned directory /run/apt-cacher-ng with root privileges. This can allow local attackers to influence the outcome of these operations.\nThis issue affects:\nopenSUSE Leap 15.1\napt-cacher-ng versions prior to 3.1-lp151.3.3.1." + "value": "The apt-cacher-ng package of openSUSE Leap 15.1 runs operations in user owned directory /run/apt-cacher-ng with root privileges. This can allow local attackers to influence the outcome of these operations. This issue affects: openSUSE Leap 15.1 apt-cacher-ng versions prior to 3.1-lp151.3.3.1." } ] }, diff --git a/2020/7xxx/CVE-2020-7932.json b/2020/7xxx/CVE-2020-7932.json new file mode 100644 index 00000000000..30382a19ce8 --- /dev/null +++ b/2020/7xxx/CVE-2020-7932.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-7932", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file