diff --git a/2010/3xxx/CVE-2010-3130.json b/2010/3xxx/CVE-2010-3130.json index ead5a52ee0b..ba39da071d8 100644 --- a/2010/3xxx/CVE-2010-3130.json +++ b/2010/3xxx/CVE-2010-3130.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "Untrusted search path vulnerability in TechSmith Snagit 10 (Build 788) allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a snag, snagcc, or snagprof file." + "value": "Untrusted search path vulnerability in TechSmith Snagit all versions 10.x and 11.x allows local users, and possibly remote attackers, to execute arbitrary code and conduct DLL hijacking attacks via a Trojan horse dwmapi.dll that is located in the same folder as a snag, snagcc, or snagprof file." } ] }, diff --git a/2019/2xxx/CVE-2019-2388.json b/2019/2xxx/CVE-2019-2388.json index 6f916a78fea..90f7d682198 100644 --- a/2019/2xxx/CVE-2019-2388.json +++ b/2019/2xxx/CVE-2019-2388.json @@ -85,8 +85,9 @@ "references": { "reference_data": [ { - "refsource": "CONFIRM", - "url": "https://docs.opsmanager.mongodb.com/current/release-notes/application/#onprem-server-4-0" + "refsource": "MISC", + "url": "https://docs.opsmanager.mongodb.com/current/release-notes/application/#onprem-server-4-0", + "name": "https://docs.opsmanager.mongodb.com/current/release-notes/application/#onprem-server-4-0" } ] }, diff --git a/2020/11xxx/CVE-2020-11541.json b/2020/11xxx/CVE-2020-11541.json index b1e0c73464c..329e428df01 100644 --- a/2020/11xxx/CVE-2020-11541.json +++ b/2020/11xxx/CVE-2020-11541.json @@ -34,7 +34,7 @@ "description_data": [ { "lang": "eng", - "value": "In TechSmith SnagIt before 20.1.1, an XML External Entity (XXE) injection issue exists that would allow a local attacker to exfiltrate data under the local Administrator account." + "value": "In TechSmith SnagIt 11.2.1 through 20.0.3, an XML External Entity (XXE) injection issue exists that would allow a local attacker to exfiltrate data under the local Administrator account." } ] }, diff --git a/2020/12xxx/CVE-2020-12827.json b/2020/12xxx/CVE-2020-12827.json new file mode 100644 index 00000000000..5059766fabf --- /dev/null +++ b/2020/12xxx/CVE-2020-12827.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-12827", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file