diff --git a/2013/2xxx/CVE-2013-2108.json b/2013/2xxx/CVE-2013-2108.json index a268ed18bc8..94be2de8396 100644 --- a/2013/2xxx/CVE-2013-2108.json +++ b/2013/2xxx/CVE-2013-2108.json @@ -1,8 +1,31 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2108", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "WP Cleanfix Plugin authors", + "product": { + "product_data": [ + { + "product_name": "WP Cleanfix Plugin", + "version": { + "version_data": [ + { + "version_value": "2.4.4" + } + ] + } + } + ] + } + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,43 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WordPress WP Cleanfix Plugin 2.4.4 has CSRF" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "CSRF" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://www.securityfocus.com/bid/59940", + "refsource": "MISC", + "name": "http://www.securityfocus.com/bid/59940" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84435", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84435" + }, + { + "url": "http://www.openwall.com/lists/oss-security/2013/05/18/11", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/05/18/11" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84562", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84562" } ] } diff --git a/2013/2xxx/CVE-2013-2109.json b/2013/2xxx/CVE-2013-2109.json index 834abf505f7..7eb9967d41e 100644 --- a/2013/2xxx/CVE-2013-2109.json +++ b/2013/2xxx/CVE-2013-2109.json @@ -1,8 +1,31 @@ { "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", + "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2013-2109", - "STATE": "RESERVED" + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "wp-cleanfix", + "version": { + "version_data": [ + { + "version_value": "1.4" + } + ] + } + } + ] + }, + "vendor_name": "wp-cleanfix authors" + } + ] + } }, "data_format": "MITRE", "data_type": "CVE", @@ -11,7 +34,33 @@ "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "WordPress plugin wp-cleanfix has Remote Code Execution" + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Code Execution" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "http://www.openwall.com/lists/oss-security/2013/05/18/11", + "refsource": "MISC", + "name": "http://www.openwall.com/lists/oss-security/2013/05/18/11" + }, + { + "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84434", + "refsource": "MISC", + "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/84434" } ] } diff --git a/2017/18xxx/CVE-2017-18538.json b/2017/18xxx/CVE-2017-18538.json index 4b6d957fbb0..ae98cd7688a 100644 --- a/2017/18xxx/CVE-2017-18538.json +++ b/2017/18xxx/CVE-2017-18538.json @@ -56,6 +56,11 @@ "url": "https://wordpress.org/plugins/weblibrarian/#developers", "refsource": "MISC", "name": "https://wordpress.org/plugins/weblibrarian/#developers" + }, + { + "refsource": "MISC", + "name": "https://wpvulndb.com/vulnerabilities/9723", + "url": "https://wpvulndb.com/vulnerabilities/9723" } ] } diff --git a/2018/17xxx/CVE-2018-17093.json b/2018/17xxx/CVE-2018-17093.json index fb35d5b329b..4ee4a6227de 100644 --- a/2018/17xxx/CVE-2018-17093.json +++ b/2018/17xxx/CVE-2018-17093.json @@ -1,71 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-17093", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-17093", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "An issue has been discovered in mackyle xar 1.6.1. There is a NULL pointer dereference in xar_get_path in lib/util.c." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://github.com/mackyle/xar/issues/19", - "refsource": "MISC", - "url": "https://github.com/mackyle/xar/issues/19" - }, - { - "refsource": "FEDORA", - "name": "FEDORA-2020-bbd24dd0cf", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2S2KRIILUKBJHXDNYJQQX74TFUQRG5ND/" - }, - { - "refsource": "FEDORA", - "name": "FEDORA-2020-edf53cd770", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YV6RF6VWM7AFYFTTS7VY5TNH26QUEEFC/" + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-11125. Reason: This candidate is a duplicate of CVE-2017-11125. Notes: All CVE users should reference CVE-2017-11125 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2018/17xxx/CVE-2018-17094.json b/2018/17xxx/CVE-2018-17094.json index 878ed2baf6b..6b2b1051ad5 100644 --- a/2018/17xxx/CVE-2018-17094.json +++ b/2018/17xxx/CVE-2018-17094.json @@ -1,71 +1,17 @@ { - "CVE_data_meta": { - "ASSIGNER": "cve@mitre.org", - "ID": "CVE-2018-17094", - "STATE": "PUBLIC" - }, - "affects": { - "vendor": { - "vendor_data": [ - { - "product": { - "product_data": [ - { - "product_name": "n/a", - "version": { - "version_data": [ - { - "version_value": "n/a" - } - ] - } - } - ] - }, - "vendor_name": "n/a" - } - ] - } - }, - "data_format": "MITRE", "data_type": "CVE", + "data_format": "MITRE", "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2018-17094", + "ASSIGNER": "cve@mitre.org", + "STATE": "REJECT" + }, "description": { "description_data": [ { "lang": "eng", - "value": "An issue has been discovered in mackyle xar 1.6.1. There is a NULL pointer dereference in xar_unserialize in lib/archive.c." - } - ] - }, - "problemtype": { - "problemtype_data": [ - { - "description": [ - { - "lang": "eng", - "value": "n/a" - } - ] - } - ] - }, - "references": { - "reference_data": [ - { - "name": "https://github.com/mackyle/xar/issues/20", - "refsource": "MISC", - "url": "https://github.com/mackyle/xar/issues/20" - }, - { - "refsource": "FEDORA", - "name": "FEDORA-2020-bbd24dd0cf", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2S2KRIILUKBJHXDNYJQQX74TFUQRG5ND/" - }, - { - "refsource": "FEDORA", - "name": "FEDORA-2020-edf53cd770", - "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YV6RF6VWM7AFYFTTS7VY5TNH26QUEEFC/" + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2017-11124. Reason: This candidate is a duplicate of CVE-2017-11124. Notes: All CVE users should reference CVE-2017-11124 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage." } ] } diff --git a/2019/15xxx/CVE-2019-15604.json b/2019/15xxx/CVE-2019-15604.json index 06ccef9b77c..f7e0c981fe4 100644 --- a/2019/15xxx/CVE-2019-15604.json +++ b/2019/15xxx/CVE-2019-15604.json @@ -53,6 +53,21 @@ "refsource": "CONFIRM", "name": "https://nodejs.org/en/blog/release/v13.8.0/", "url": "https://nodejs.org/en/blog/release/v13.8.0/" + }, + { + "refsource": "CONFIRM", + "name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/", + "url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/" + }, + { + "refsource": "CONFIRM", + "name": "https://nodejs.org/en/blog/release/v10.19.0/", + "url": "https://nodejs.org/en/blog/release/v10.19.0/" + }, + { + "refsource": "CONFIRM", + "name": "https://nodejs.org/en/blog/release/v12.15.0/", + "url": "https://nodejs.org/en/blog/release/v12.15.0/" } ] }, diff --git a/2019/15xxx/CVE-2019-15605.json b/2019/15xxx/CVE-2019-15605.json index cdc57ec3760..e51345e2506 100644 --- a/2019/15xxx/CVE-2019-15605.json +++ b/2019/15xxx/CVE-2019-15605.json @@ -58,6 +58,21 @@ "refsource": "FEDORA", "name": "FEDORA-2020-3838c8ea98", "url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZLB676PDU4RJQLWQUA277YNGYYNEYGWO/" + }, + { + "refsource": "CONFIRM", + "name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/", + "url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/" + }, + { + "refsource": "CONFIRM", + "name": "https://nodejs.org/en/blog/release/v10.19.0/", + "url": "https://nodejs.org/en/blog/release/v10.19.0/" + }, + { + "refsource": "CONFIRM", + "name": "https://nodejs.org/en/blog/release/v12.15.0/", + "url": "https://nodejs.org/en/blog/release/v12.15.0/" } ] }, diff --git a/2019/15xxx/CVE-2019-15606.json b/2019/15xxx/CVE-2019-15606.json index 16620ab0549..5eb654141c8 100644 --- a/2019/15xxx/CVE-2019-15606.json +++ b/2019/15xxx/CVE-2019-15606.json @@ -53,6 +53,21 @@ "refsource": "CONFIRM", "name": "https://nodejs.org/en/blog/release/v13.8.0/", "url": "https://nodejs.org/en/blog/release/v13.8.0/" + }, + { + "refsource": "CONFIRM", + "name": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/", + "url": "https://nodejs.org/en/blog/vulnerability/february-2020-security-releases/" + }, + { + "refsource": "CONFIRM", + "name": "https://nodejs.org/en/blog/release/v10.19.0/", + "url": "https://nodejs.org/en/blog/release/v10.19.0/" + }, + { + "refsource": "CONFIRM", + "name": "https://nodejs.org/en/blog/release/v12.15.0/", + "url": "https://nodejs.org/en/blog/release/v12.15.0/" } ] }, diff --git a/2019/19xxx/CVE-2019-19662.json b/2019/19xxx/CVE-2019-19662.json index a3dd7b69420..0828d7111bd 100644 --- a/2019/19xxx/CVE-2019-19662.json +++ b/2019/19xxx/CVE-2019-19662.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-19662", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-19662", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CSRF vulnerability exists in the Web File Manager's Create/Delete Accounts functionality of Rumpus FTP Server 8.2.9.1. By exploiting it, an attacker can Create and Delete accounts via RAPR/TriggerServerFunction.html." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/harshit-shukla/CVE", + "url": "https://github.com/harshit-shukla/CVE" + }, + { + "refsource": "MISC", + "name": "https://github.com/harshit-shukla/CVE/blob/master/CVE-2019-19662.md", + "url": "https://github.com/harshit-shukla/CVE/blob/master/CVE-2019-19662.md" } ] } diff --git a/2019/19xxx/CVE-2019-19664.json b/2019/19xxx/CVE-2019-19664.json index 62085abce7c..d71d15e2360 100644 --- a/2019/19xxx/CVE-2019-19664.json +++ b/2019/19xxx/CVE-2019-19664.json @@ -1,17 +1,66 @@ { - "data_type": "CVE", - "data_format": "MITRE", - "data_version": "4.0", "CVE_data_meta": { - "ID": "CVE-2019-19664", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ID": "CVE-2019-19664", + "STATE": "PUBLIC" }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A CSRF vulnerability exists in the Web Settings of Web File Manager in Rumpus FTP 8.2.9.1. Exploitation of this vulnerability can result in manipulation of Server Web settings at RAPR/WebSettingsGeneralSet.html." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "MISC", + "name": "https://github.com/harshit-shukla/CVE", + "url": "https://github.com/harshit-shukla/CVE" + }, + { + "refsource": "MISC", + "name": "https://github.com/harshit-shukla/CVE/blob/master/CVE-2019-19664.md", + "url": "https://github.com/harshit-shukla/CVE/blob/master/CVE-2019-19664.md" } ] } diff --git a/2019/20xxx/CVE-2019-20104.json b/2019/20xxx/CVE-2019-20104.json index 7628f982f4f..42384d7065a 100644 --- a/2019/20xxx/CVE-2019-20104.json +++ b/2019/20xxx/CVE-2019-20104.json @@ -66,6 +66,11 @@ "url": "https://jira.atlassian.com/browse/CWD-5526", "refsource": "MISC", "name": "https://jira.atlassian.com/browse/CWD-5526" + }, + { + "refsource": "MISC", + "name": "https://zeroauth.ltd/blog/2020/02/07/cve-2019-20104-atlassian-crowd-openid-client-vulnerable-to-remote-dos-via-xml-entity-expansion/", + "url": "https://zeroauth.ltd/blog/2020/02/07/cve-2019-20104-atlassian-crowd-openid-client-vulnerable-to-remote-dos-via-xml-entity-expansion/" } ] } diff --git a/2019/6xxx/CVE-2019-6146.json b/2019/6xxx/CVE-2019-6146.json index d409d27223f..5b44bf3d60e 100644 --- a/2019/6xxx/CVE-2019-6146.json +++ b/2019/6xxx/CVE-2019-6146.json @@ -48,6 +48,11 @@ "refsource": "MISC", "name": "https://support.forcepoint.com/KBArticle?id=000017702", "url": "https://support.forcepoint.com/KBArticle?id=000017702" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156274/Forcepoint-WebSecurity-8.5-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/156274/Forcepoint-WebSecurity-8.5-Cross-Site-Scripting.html" } ] }, diff --git a/2019/9xxx/CVE-2019-9278.json b/2019/9xxx/CVE-2019-9278.json index 0b108bfcc30..972392da96f 100644 --- a/2019/9xxx/CVE-2019-9278.json +++ b/2019/9xxx/CVE-2019-9278.json @@ -68,6 +68,11 @@ "refsource": "DEBIAN", "name": "DSA-4618", "url": "https://www.debian.org/security/2020/dsa-4618" + }, + { + "refsource": "MLIST", + "name": "[debian-lts-announce] 20200210 [SECURITY] [DLA 2100-1] libexif security update", + "url": "https://lists.debian.org/debian-lts-announce/2020/02/msg00007.html" } ] }, diff --git a/2020/3xxx/CVE-2020-3123.json b/2020/3xxx/CVE-2020-3123.json index 7398efabf9f..9716455ec47 100644 --- a/2020/3xxx/CVE-2020-3123.json +++ b/2020/3xxx/CVE-2020-3123.json @@ -81,6 +81,11 @@ "name": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs59062", "refsource": "CISCO", "url": "https://quickview.cloudapps.cisco.com/quickview/bug/CSCvs59062" + }, + { + "refsource": "CONFIRM", + "name": "https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html", + "url": "https://blog.clamav.net/2020/02/clamav-01022-security-patch-released.html" } ] }, diff --git a/2020/7xxx/CVE-2020-7108.json b/2020/7xxx/CVE-2020-7108.json index 39dc2dd0818..0feccad5cd7 100644 --- a/2020/7xxx/CVE-2020-7108.json +++ b/2020/7xxx/CVE-2020-7108.json @@ -71,6 +71,11 @@ "refsource": "MISC", "name": "https://www.jinsonvarghese.com/reflected-xss-in-learndash-wordpress-plugin/", "url": "https://www.jinsonvarghese.com/reflected-xss-in-learndash-wordpress-plugin/" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156275/LearnDash-WordPress-LMS-3.1.2-Cross-Site-Scripting.html", + "url": "http://packetstormsecurity.com/files/156275/LearnDash-WordPress-LMS-3.1.2-Cross-Site-Scripting.html" } ] } diff --git a/2020/8xxx/CVE-2020-8516.json b/2020/8xxx/CVE-2020-8516.json index 810971a97e4..05fefe46fee 100644 --- a/2020/8xxx/CVE-2020-8516.json +++ b/2020/8xxx/CVE-2020-8516.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information." + "value": "** DISPUTED ** The daemon in Tor through 0.4.1.8 and 0.4.2.x through 0.4.2.6 does not verify that a rendezvous node is known before attempting to connect to it, which might make it easier for remote attackers to discover circuit information. NOTE: The network team of Tor claims this is an intended behavior and not a vulnerability." } ] }, @@ -56,6 +56,11 @@ "url": "https://www.hackerfactor.com/blog/index.php?/archives/868-Deanonymizing-Tor-Circuits.html", "refsource": "MISC", "name": "https://www.hackerfactor.com/blog/index.php?/archives/868-Deanonymizing-Tor-Circuits.html" + }, + { + "refsource": "MISC", + "name": "https://lists.torproject.org/pipermail/tor-dev/2020-February/014147.html", + "url": "https://lists.torproject.org/pipermail/tor-dev/2020-February/014147.html" } ] } diff --git a/2020/8xxx/CVE-2020-8654.json b/2020/8xxx/CVE-2020-8654.json index fc88aa1babf..a2060952b48 100644 --- a/2020/8xxx/CVE-2020-8654.json +++ b/2020/8xxx/CVE-2020-8654.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/EyesOfNetworkCommunity/eonweb/issues/50", "url": "https://github.com/EyesOfNetworkCommunity/eonweb/issues/50" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html" } ] } diff --git a/2020/8xxx/CVE-2020-8655.json b/2020/8xxx/CVE-2020-8655.json index b6afdfb3254..2455b7897ef 100644 --- a/2020/8xxx/CVE-2020-8655.json +++ b/2020/8xxx/CVE-2020-8655.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/EyesOfNetworkCommunity/eonconf/issues/8", "url": "https://github.com/EyesOfNetworkCommunity/eonconf/issues/8" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html" } ] } diff --git a/2020/8xxx/CVE-2020-8656.json b/2020/8xxx/CVE-2020-8656.json index 3cc1a84c2ac..ec5bbeb41fc 100644 --- a/2020/8xxx/CVE-2020-8656.json +++ b/2020/8xxx/CVE-2020-8656.json @@ -56,6 +56,11 @@ "refsource": "MISC", "name": "https://github.com/EyesOfNetworkCommunity/eonapi/issues/16", "url": "https://github.com/EyesOfNetworkCommunity/eonapi/issues/16" + }, + { + "refsource": "MISC", + "name": "http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html", + "url": "http://packetstormsecurity.com/files/156266/EyesOfNetwork-5.3-Remote-Code-Execution.html" } ] }