diff --git a/2017/1000xxx/CVE-2017-1000475.json b/2017/1000xxx/CVE-2017-1000475.json index 3759ebb28dd..11836acbb99 100644 --- a/2017/1000xxx/CVE-2017-1000475.json +++ b/2017/1000xxx/CVE-2017-1000475.json @@ -58,6 +58,11 @@ "name": "https://github.com/lajarajorge/CVE-2017-1000475/blob/master/README.md", "refsource": "MISC", "url": "https://github.com/lajarajorge/CVE-2017-1000475/blob/master/README.md" + }, + { + "refsource": "EXPLOIT-DB", + "name": "Explooit Database", + "url": "https://www.exploit-db.com/exploits/48044" } ] } diff --git a/2020/10xxx/CVE-2020-10665.json b/2020/10xxx/CVE-2020-10665.json index 91707b44516..6796b345985 100644 --- a/2020/10xxx/CVE-2020-10665.json +++ b/2020/10xxx/CVE-2020-10665.json @@ -61,6 +61,11 @@ "url": "https://docs.docker.com/release-notes/", "refsource": "MISC", "name": "https://docs.docker.com/release-notes/" + }, + { + "refsource": "MISC", + "name": "https://github.com/spaceraccoon/CVE-2020-10665", + "url": "https://github.com/spaceraccoon/CVE-2020-10665" } ] } diff --git a/2020/15xxx/CVE-2020-15503.json b/2020/15xxx/CVE-2020-15503.json new file mode 100644 index 00000000000..62681b0cff5 --- /dev/null +++ b/2020/15xxx/CVE-2020-15503.json @@ -0,0 +1,72 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-15503", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "LibRaw before 0.20-RC1 lacks a thumbnail size range check. This affects decoders/unpack_thumb.cpp, postprocessing/mem_image.cpp, and utils/thumb_utils.cpp. For example, malloc(sizeof(libraw_processed_image_t)+T.tlength) occurs without validating T.tlength." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://www.libraw.org/news/libraw-0-20-rc1", + "refsource": "MISC", + "name": "https://www.libraw.org/news/libraw-0-20-rc1" + }, + { + "url": "https://github.com/LibRaw/LibRaw/compare/0.20-Beta3...0.20-RC1", + "refsource": "MISC", + "name": "https://github.com/LibRaw/LibRaw/compare/0.20-Beta3...0.20-RC1" + }, + { + "url": "https://github.com/LibRaw/LibRaw/commit/20ad21c0d87ca80217aee47533d91e633ce1864d", + "refsource": "MISC", + "name": "https://github.com/LibRaw/LibRaw/commit/20ad21c0d87ca80217aee47533d91e633ce1864d" + } + ] + } +} \ No newline at end of file diff --git a/2020/6xxx/CVE-2020-6242.json b/2020/6xxx/CVE-2020-6242.json index e7d6f54202b..3e95db2f534 100644 --- a/2020/6xxx/CVE-2020-6242.json +++ b/2020/6xxx/CVE-2020-6242.json @@ -43,7 +43,7 @@ "description_data": [ { "lang": "eng", - "value": "SAP Business Objects Business Intelligence Platform (Live Data Connect), versions 1.0, 2.0, 2.x, allows an attacker to logon on the Central Management Console without password in case of the BIPRWS application server was not protected with some specific certificate, leading to Missing Authentication Check." + "value": "SAP Business Objects Business Intelligence Platform (Live Data Connect), versions 1.0, 2.0, 2.1, 2.2, 2.3, allows an attacker to logon on the Central Management Console without password in case of the BIPRWS application server was not protected with some specific certificate, leading to Missing Authentication Check." } ] }, @@ -77,6 +77,11 @@ "url": "https://launchpad.support.sap.com/#/notes/2885244", "refsource": "MISC", "name": "https://launchpad.support.sap.com/#/notes/2885244" + }, + { + "refsource": "CONFIRM", + "name": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=545396222", + "url": "https://wiki.scn.sap.com/wiki/pages/viewpage.action?pageId=545396222" } ] }