From 4b24802a371ff81bacf5719b7401364b2191cac3 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Wed, 6 Jan 2021 17:05:48 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2011/3xxx/CVE-2011-3178.json | 2 +- 2011/4xxx/CVE-2011-4182.json | 2 +- 2014/8xxx/CVE-2014-8709.json | 2 +- 2015/0xxx/CVE-2015-0794.json | 2 +- 2016/1xxx/CVE-2016-1595.json | 2 +- 2016/1xxx/CVE-2016-1596.json | 2 +- 2016/1xxx/CVE-2016-1600.json | 2 +- 2016/3xxx/CVE-2016-3185.json | 2 +- 2016/5xxx/CVE-2016-5748.json | 2 +- 2016/5xxx/CVE-2016-5759.json | 2 +- 2016/8xxx/CVE-2016-8666.json | 2 +- 2016/9xxx/CVE-2016-9168.json | 2 +- 2017/14xxx/CVE-2017-14353.json | 2 +- 2017/14xxx/CVE-2017-14354.json | 2 +- 2017/5xxx/CVE-2017-5183.json | 2 +- 2017/5xxx/CVE-2017-5191.json | 2 +- 2017/7xxx/CVE-2017-7422.json | 2 +- 2017/7xxx/CVE-2017-7437.json | 2 +- 2017/7xxx/CVE-2017-7438.json | 2 +- 2017/9xxx/CVE-2017-9269.json | 2 +- 2018/12xxx/CVE-2018-12464.json | 2 +- 2018/17xxx/CVE-2018-17950.json | 2 +- 2018/17xxx/CVE-2018-17957.json | 2 +- 2018/18xxx/CVE-2018-18589.json | 2 +- 2018/1xxx/CVE-2018-1347.json | 2 +- 2018/6xxx/CVE-2018-6486.json | 2 +- 2018/6xxx/CVE-2018-6488.json | 2 +- 2018/6xxx/CVE-2018-6491.json | 2 +- 2018/6xxx/CVE-2018-6492.json | 2 +- 2018/6xxx/CVE-2018-6493.json | 2 +- 2018/6xxx/CVE-2018-6505.json | 2 +- 2018/7xxx/CVE-2018-7685.json | 2 +- 2018/7xxx/CVE-2018-7688.json | 2 +- 2019/11xxx/CVE-2019-11653.json | 2 +- 2019/11xxx/CVE-2019-11655.json | 2 +- 2019/11xxx/CVE-2019-11663.json | 2 +- 2019/11xxx/CVE-2019-11667.json | 2 +- 2019/16xxx/CVE-2019-16954.json | 72 ++++++++++++++++++++++++++++++++++ 2019/16xxx/CVE-2019-16962.json | 67 +++++++++++++++++++++++++++++++ 2019/18xxx/CVE-2019-18946.json | 18 +++++++++ 2019/3xxx/CVE-2019-3475.json | 2 +- 2019/3xxx/CVE-2019-3493.json | 2 +- 2020/11xxx/CVE-2020-11861.json | 2 +- 2020/5xxx/CVE-2020-5102.json | 4 +- 2020/5xxx/CVE-2020-5103.json | 4 +- 2020/5xxx/CVE-2020-5104.json | 4 +- 2021/21xxx/CVE-2021-21236.json | 2 +- 2021/3xxx/CVE-2021-3028.json | 18 +++++++++ 48 files changed, 222 insertions(+), 47 deletions(-) create mode 100644 2019/16xxx/CVE-2019-16954.json create mode 100644 2019/16xxx/CVE-2019-16962.json create mode 100644 2019/18xxx/CVE-2019-18946.json create mode 100644 2021/3xxx/CVE-2021-3028.json diff --git a/2011/3xxx/CVE-2011-3178.json b/2011/3xxx/CVE-2011-3178.json index bc0d434b5e2..0bdfa9914e2 100644 --- a/2011/3xxx/CVE-2011-3178.json +++ b/2011/3xxx/CVE-2011-3178.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2011-10-13T00:00:00.000Z", "ID": "CVE-2011-3178", "STATE": "PUBLIC", diff --git a/2011/4xxx/CVE-2011-4182.json b/2011/4xxx/CVE-2011-4182.json index fbdfb35ef56..f3184685158 100644 --- a/2011/4xxx/CVE-2011-4182.json +++ b/2011/4xxx/CVE-2011-4182.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2011-12-07T00:00:00.000Z", "ID": "CVE-2011-4182", "STATE": "PUBLIC", diff --git a/2014/8xxx/CVE-2014-8709.json b/2014/8xxx/CVE-2014-8709.json index 7ce6bfc2bd5..5df20f5a64c 100644 --- a/2014/8xxx/CVE-2014-8709.json +++ b/2014/8xxx/CVE-2014-8709.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2014-8709", "STATE": "PUBLIC" }, diff --git a/2015/0xxx/CVE-2015-0794.json b/2015/0xxx/CVE-2015-0794.json index adb054b8cb2..584f6cd63ac 100644 --- a/2015/0xxx/CVE-2015-0794.json +++ b/2015/0xxx/CVE-2015-0794.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2015-0794", "STATE": "PUBLIC" }, diff --git a/2016/1xxx/CVE-2016-1595.json b/2016/1xxx/CVE-2016-1595.json index f84a254f98f..de3baed3af8 100644 --- a/2016/1xxx/CVE-2016-1595.json +++ b/2016/1xxx/CVE-2016-1595.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-1595", "STATE": "PUBLIC" }, diff --git a/2016/1xxx/CVE-2016-1596.json b/2016/1xxx/CVE-2016-1596.json index 63335acda4f..5dfaf58a883 100644 --- a/2016/1xxx/CVE-2016-1596.json +++ b/2016/1xxx/CVE-2016-1596.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-1596", "STATE": "PUBLIC" }, diff --git a/2016/1xxx/CVE-2016-1600.json b/2016/1xxx/CVE-2016-1600.json index b747bb805e8..f9c7b3a3f83 100644 --- a/2016/1xxx/CVE-2016-1600.json +++ b/2016/1xxx/CVE-2016-1600.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2016-1600", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2016/3xxx/CVE-2016-3185.json b/2016/3xxx/CVE-2016-3185.json index 9ff67ad127d..6127f1987ad 100644 --- a/2016/3xxx/CVE-2016-3185.json +++ b/2016/3xxx/CVE-2016-3185.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-3185", "STATE": "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5748.json b/2016/5xxx/CVE-2016-5748.json index 379e4d66cb0..954298b3c71 100644 --- a/2016/5xxx/CVE-2016-5748.json +++ b/2016/5xxx/CVE-2016-5748.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-5748", "STATE": "PUBLIC" }, diff --git a/2016/5xxx/CVE-2016-5759.json b/2016/5xxx/CVE-2016-5759.json index f904cabae71..ed225026a8a 100644 --- a/2016/5xxx/CVE-2016-5759.json +++ b/2016/5xxx/CVE-2016-5759.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-5759", "STATE": "PUBLIC" }, diff --git a/2016/8xxx/CVE-2016-8666.json b/2016/8xxx/CVE-2016-8666.json index e7a7c4c2e77..4b252559010 100644 --- a/2016/8xxx/CVE-2016-8666.json +++ b/2016/8xxx/CVE-2016-8666.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-8666", "STATE": "PUBLIC" }, diff --git a/2016/9xxx/CVE-2016-9168.json b/2016/9xxx/CVE-2016-9168.json index 4ab30fa9d59..d6b5a03f6d4 100644 --- a/2016/9xxx/CVE-2016-9168.json +++ b/2016/9xxx/CVE-2016-9168.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2016-9168", "STATE": "PUBLIC" }, diff --git a/2017/14xxx/CVE-2017-14353.json b/2017/14xxx/CVE-2017-14353.json index 19701cfefc6..5c2e026cbb7 100644 --- a/2017/14xxx/CVE-2017-14353.json +++ b/2017/14xxx/CVE-2017-14353.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2017-14353", "STATE": "PUBLIC" }, diff --git a/2017/14xxx/CVE-2017-14354.json b/2017/14xxx/CVE-2017-14354.json index b32a0018db5..c5e361abce3 100644 --- a/2017/14xxx/CVE-2017-14354.json +++ b/2017/14xxx/CVE-2017-14354.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2017-14354", "STATE": "PUBLIC" }, diff --git a/2017/5xxx/CVE-2017-5183.json b/2017/5xxx/CVE-2017-5183.json index 0e9d7b14a58..1aa58bc72e1 100644 --- a/2017/5xxx/CVE-2017-5183.json +++ b/2017/5xxx/CVE-2017-5183.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2017-5183", "STATE": "PUBLIC" }, diff --git a/2017/5xxx/CVE-2017-5191.json b/2017/5xxx/CVE-2017-5191.json index 0eff0823825..ef6321089b9 100644 --- a/2017/5xxx/CVE-2017-5191.json +++ b/2017/5xxx/CVE-2017-5191.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2017-5191", "STATE": "PUBLIC" }, diff --git a/2017/7xxx/CVE-2017-7422.json b/2017/7xxx/CVE-2017-7422.json index e8798429dff..37fc41c7824 100644 --- a/2017/7xxx/CVE-2017-7422.json +++ b/2017/7xxx/CVE-2017-7422.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2017-08-19T00:00:00", "ID": "CVE-2017-7422", "STATE": "PUBLIC" diff --git a/2017/7xxx/CVE-2017-7437.json b/2017/7xxx/CVE-2017-7437.json index c224e97af92..ef649b87700 100644 --- a/2017/7xxx/CVE-2017-7437.json +++ b/2017/7xxx/CVE-2017-7437.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2017-06-01T00:00:00.000Z", "ID": "CVE-2017-7437", "STATE": "PUBLIC", diff --git a/2017/7xxx/CVE-2017-7438.json b/2017/7xxx/CVE-2017-7438.json index bc121ff9d9d..cb3f1790906 100644 --- a/2017/7xxx/CVE-2017-7438.json +++ b/2017/7xxx/CVE-2017-7438.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2017-06-01T00:00:00.000Z", "ID": "CVE-2017-7438", "STATE": "PUBLIC", diff --git a/2017/9xxx/CVE-2017-9269.json b/2017/9xxx/CVE-2017-9269.json index 781e4b3a263..e32154c96f1 100644 --- a/2017/9xxx/CVE-2017-9269.json +++ b/2017/9xxx/CVE-2017-9269.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2017-08-03T00:00:00.000Z", "ID": "CVE-2017-9269", "STATE": "PUBLIC", diff --git a/2018/12xxx/CVE-2018-12464.json b/2018/12xxx/CVE-2018-12464.json index 14b6333f744..42f6e786d50 100644 --- a/2018/12xxx/CVE-2018-12464.json +++ b/2018/12xxx/CVE-2018-12464.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-06-28T16:00:00.000Z", "ID": "CVE-2018-12464", "STATE": "PUBLIC", diff --git a/2018/17xxx/CVE-2018-17950.json b/2018/17xxx/CVE-2018-17950.json index 718a887be6d..7adb669e4bc 100644 --- a/2018/17xxx/CVE-2018-17950.json +++ b/2018/17xxx/CVE-2018-17950.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2018-17950", "STATE": "PUBLIC" }, diff --git a/2018/17xxx/CVE-2018-17957.json b/2018/17xxx/CVE-2018-17957.json index 85054a09fa2..fa248f9867c 100644 --- a/2018/17xxx/CVE-2018-17957.json +++ b/2018/17xxx/CVE-2018-17957.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-12-23T00:00:00.000Z", "ID": "CVE-2018-17957", "STATE": "PUBLIC", diff --git a/2018/18xxx/CVE-2018-18589.json b/2018/18xxx/CVE-2018-18589.json index da046e9c89e..5cd3c9222f0 100644 --- a/2018/18xxx/CVE-2018-18589.json +++ b/2018/18xxx/CVE-2018-18589.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-10-19T15:30:00.000Z", "ID": "CVE-2018-18589", "STATE": "PUBLIC", diff --git a/2018/1xxx/CVE-2018-1347.json b/2018/1xxx/CVE-2018-1347.json index fbe67d84b6b..e3dec1255c0 100644 --- a/2018/1xxx/CVE-2018-1347.json +++ b/2018/1xxx/CVE-2018-1347.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2018-1347", "STATE": "PUBLIC", "TITLE": "NetIQ iManager, versions prior to 3.1, reflected XSS issue " diff --git a/2018/6xxx/CVE-2018-6486.json b/2018/6xxx/CVE-2018-6486.json index 4d8ba17f221..1aa39ad7d87 100644 --- a/2018/6xxx/CVE-2018-6486.json +++ b/2018/6xxx/CVE-2018-6486.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-02-01T18:58:00.000Z", "ID": "CVE-2018-6486", "STATE": "PUBLIC", diff --git a/2018/6xxx/CVE-2018-6488.json b/2018/6xxx/CVE-2018-6488.json index 51c9b90051a..56ea626340e 100644 --- a/2018/6xxx/CVE-2018-6488.json +++ b/2018/6xxx/CVE-2018-6488.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-02-21T22:00:00.000Z", "ID": "CVE-2018-6488", "STATE": "PUBLIC", diff --git a/2018/6xxx/CVE-2018-6491.json b/2018/6xxx/CVE-2018-6491.json index 17588060369..63bd0c68315 100644 --- a/2018/6xxx/CVE-2018-6491.json +++ b/2018/6xxx/CVE-2018-6491.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2018-6491", "STATE": "PUBLIC", "TITLE": "MFSBGN03803 rev.1 - UCMDB, Installation File Access Control Privilege Escalation Vulnerability" diff --git a/2018/6xxx/CVE-2018-6492.json b/2018/6xxx/CVE-2018-6492.json index 20c6649f534..7079020f892 100644 --- a/2018/6xxx/CVE-2018-6492.json +++ b/2018/6xxx/CVE-2018-6492.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-05-09T19:01:00.000Z", "ID": "CVE-2018-6492", "STATE": "PUBLIC", diff --git a/2018/6xxx/CVE-2018-6493.json b/2018/6xxx/CVE-2018-6493.json index 48066358668..4c42d1c6bab 100644 --- a/2018/6xxx/CVE-2018-6493.json +++ b/2018/6xxx/CVE-2018-6493.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-05-09T19:01:00.000Z", "ID": "CVE-2018-6493", "STATE": "PUBLIC", diff --git a/2018/6xxx/CVE-2018-6505.json b/2018/6xxx/CVE-2018-6505.json index 1af16abec8a..4a2b2d85370 100644 --- a/2018/6xxx/CVE-2018-6505.json +++ b/2018/6xxx/CVE-2018-6505.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-09-19T16:00:00.000Z", "ID": "CVE-2018-6505", "STATE": "PUBLIC", diff --git a/2018/7xxx/CVE-2018-7685.json b/2018/7xxx/CVE-2018-7685.json index c7683844461..48f2d6996b3 100644 --- a/2018/7xxx/CVE-2018-7685.json +++ b/2018/7xxx/CVE-2018-7685.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-08-30T00:00:00.000Z", "ID": "CVE-2018-7685", "STATE": "PUBLIC", diff --git a/2018/7xxx/CVE-2018-7688.json b/2018/7xxx/CVE-2018-7688.json index a755f96c9ca..babc366c82d 100644 --- a/2018/7xxx/CVE-2018-7688.json +++ b/2018/7xxx/CVE-2018-7688.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "DATE_PUBLIC": "2018-06-06T00:00:00.000Z", "ID": "CVE-2018-7688", "STATE": "PUBLIC", diff --git a/2019/11xxx/CVE-2019-11653.json b/2019/11xxx/CVE-2019-11653.json index 68dac599780..2f54e3bb3a4 100644 --- a/2019/11xxx/CVE-2019-11653.json +++ b/2019/11xxx/CVE-2019-11653.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-11653", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2019/11xxx/CVE-2019-11655.json b/2019/11xxx/CVE-2019-11655.json index acb6b3ee366..0d6b7019b0a 100644 --- a/2019/11xxx/CVE-2019-11655.json +++ b/2019/11xxx/CVE-2019-11655.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-11655", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2019/11xxx/CVE-2019-11663.json b/2019/11xxx/CVE-2019-11663.json index 52e7d6da775..4690ab44a65 100644 --- a/2019/11xxx/CVE-2019-11663.json +++ b/2019/11xxx/CVE-2019-11663.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-11663", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2019/11xxx/CVE-2019-11667.json b/2019/11xxx/CVE-2019-11667.json index f0ae177007e..6b199534ff3 100644 --- a/2019/11xxx/CVE-2019-11667.json +++ b/2019/11xxx/CVE-2019-11667.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-11667", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2019/16xxx/CVE-2019-16954.json b/2019/16xxx/CVE-2019-16954.json new file mode 100644 index 00000000000..757e234e6e0 --- /dev/null +++ b/2019/16xxx/CVE-2019-16954.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16954", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "SolarWinds Web Help Desk 12.7.0 allows HTML injection via a Comment in a Help Request ticket." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://support.solarwinds.com/SuccessCenter/s/", + "refsource": "MISC", + "name": "https://support.solarwinds.com/SuccessCenter/s/" + }, + { + "url": "https://www.solarwinds.com/free-tools/free-help-desk-software", + "refsource": "MISC", + "name": "https://www.solarwinds.com/free-tools/free-help-desk-software" + }, + { + "refsource": "MISC", + "name": "https://www.esecforte.com/html-injection-vulnerability-in-solarwinds-web-help-desk/", + "url": "https://www.esecforte.com/html-injection-vulnerability-in-solarwinds-web-help-desk/" + } + ] + } +} \ No newline at end of file diff --git a/2019/16xxx/CVE-2019-16962.json b/2019/16xxx/CVE-2019-16962.json new file mode 100644 index 00000000000..c33ada4a190 --- /dev/null +++ b/2019/16xxx/CVE-2019-16962.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2019-16962", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "Zoho ManageEngine Desktop Central 10.0.430 allows HTML injection via a modified Report Name in a New Custom Report." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.manageengine.com/products/desktop-central/download.html", + "refsource": "MISC", + "name": "https://www.manageengine.com/products/desktop-central/download.html" + }, + { + "refsource": "MISC", + "name": "https://www.esecforte.com/manage-engine-desktopcentral-india-html-injection-vulnerability/", + "url": "https://www.esecforte.com/manage-engine-desktopcentral-india-html-injection-vulnerability/" + } + ] + } +} \ No newline at end of file diff --git a/2019/18xxx/CVE-2019-18946.json b/2019/18xxx/CVE-2019-18946.json new file mode 100644 index 00000000000..166ddecfdb5 --- /dev/null +++ b/2019/18xxx/CVE-2019-18946.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2019-18946", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2019/3xxx/CVE-2019-3475.json b/2019/3xxx/CVE-2019-3475.json index 2911aef05ca..82a07d5d77b 100644 --- a/2019/3xxx/CVE-2019-3475.json +++ b/2019/3xxx/CVE-2019-3475.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "ID": "CVE-2019-3475", "STATE": "PUBLIC", "TITLE": "Local privilege escalation in Filr famtd" diff --git a/2019/3xxx/CVE-2019-3493.json b/2019/3xxx/CVE-2019-3493.json index 085cbec9426..6a82cdadfd5 100644 --- a/2019/3xxx/CVE-2019-3493.json +++ b/2019/3xxx/CVE-2019-3493.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2019-3493", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2020/11xxx/CVE-2020-11861.json b/2020/11xxx/CVE-2020-11861.json index d51fdc539b0..bb433f88f5b 100644 --- a/2020/11xxx/CVE-2020-11861.json +++ b/2020/11xxx/CVE-2020-11861.json @@ -4,7 +4,7 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2020-11861", - "ASSIGNER": "security@suse.com", + "ASSIGNER": "security@microfocus.com", "STATE": "PUBLIC" }, "affects": { diff --git a/2020/5xxx/CVE-2020-5102.json b/2020/5xxx/CVE-2020-5102.json index 0d45631cbbc..52053ddcd68 100644 --- a/2020/5xxx/CVE-2020-5102.json +++ b/2020/5xxx/CVE-2020-5102.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2020-5102", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none." } ] } diff --git a/2020/5xxx/CVE-2020-5103.json b/2020/5xxx/CVE-2020-5103.json index 0825f8f17bc..ba3e43637f2 100644 --- a/2020/5xxx/CVE-2020-5103.json +++ b/2020/5xxx/CVE-2020-5103.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2020-5103", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none." } ] } diff --git a/2020/5xxx/CVE-2020-5104.json b/2020/5xxx/CVE-2020-5104.json index 1da41c32083..f938ab91652 100644 --- a/2020/5xxx/CVE-2020-5104.json +++ b/2020/5xxx/CVE-2020-5104.json @@ -5,13 +5,13 @@ "CVE_data_meta": { "ID": "CVE-2020-5104", "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "STATE": "REJECT" }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was in a CNA pool that was not assigned to any issues during 2020. Notes: none." } ] } diff --git a/2021/21xxx/CVE-2021-21236.json b/2021/21xxx/CVE-2021-21236.json index cb0e17e7c0f..916fca30e1e 100644 --- a/2021/21xxx/CVE-2021-21236.json +++ b/2021/21xxx/CVE-2021-21236.json @@ -35,7 +35,7 @@ "description_data": [ { "lang": "eng", - "value": "CairoSVG is a Python (pypi) package. CairoSVG is an SVG converter based on Cairo.\n\nIn CairoSVG before version 2.5.1, there is a regular expression denial of service (REDoS) vulnerability.\n\nWhen processing SVG files, the python package CairoSVG uses two regular expressions which are vulnerable to Regular Expression Denial of Service (REDoS).\nIf an attacker provides a malicious SVG, it can make cairosvg get stuck processing the file for a very long time.\n\nThis is fixed in version 2.5.1. See Referenced GitHub advisory for more information." + "value": "CairoSVG is a Python (pypi) package. CairoSVG is an SVG converter based on Cairo. In CairoSVG before version 2.5.1, there is a regular expression denial of service (REDoS) vulnerability. When processing SVG files, the python package CairoSVG uses two regular expressions which are vulnerable to Regular Expression Denial of Service (REDoS). If an attacker provides a malicious SVG, it can make cairosvg get stuck processing the file for a very long time. This is fixed in version 2.5.1. See Referenced GitHub advisory for more information." } ] }, diff --git a/2021/3xxx/CVE-2021-3028.json b/2021/3xxx/CVE-2021-3028.json new file mode 100644 index 00000000000..adb93001526 --- /dev/null +++ b/2021/3xxx/CVE-2021-3028.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2021-3028", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file