From 8489226dcefe229df8214a53e8aff8118c0d2021 Mon Sep 17 00:00:00 2001 From: CVE Team Date: Sun, 9 Aug 2020 19:01:22 +0000 Subject: [PATCH] "-Synchronized-Data." --- 2020/17xxx/CVE-2020-17449.json | 18 +++++++++ 2020/17xxx/CVE-2020-17450.json | 18 +++++++++ 2020/17xxx/CVE-2020-17451.json | 67 ++++++++++++++++++++++++++++++++++ 2020/17xxx/CVE-2020-17452.json | 67 ++++++++++++++++++++++++++++++++++ 4 files changed, 170 insertions(+) create mode 100644 2020/17xxx/CVE-2020-17449.json create mode 100644 2020/17xxx/CVE-2020-17450.json create mode 100644 2020/17xxx/CVE-2020-17451.json create mode 100644 2020/17xxx/CVE-2020-17452.json diff --git a/2020/17xxx/CVE-2020-17449.json b/2020/17xxx/CVE-2020-17449.json new file mode 100644 index 00000000000..edf6090fd87 --- /dev/null +++ b/2020/17xxx/CVE-2020-17449.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17449", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17450.json b/2020/17xxx/CVE-2020-17450.json new file mode 100644 index 00000000000..8b65fad62c6 --- /dev/null +++ b/2020/17xxx/CVE-2020-17450.json @@ -0,0 +1,18 @@ +{ + "data_type": "CVE", + "data_format": "MITRE", + "data_version": "4.0", + "CVE_data_meta": { + "ID": "CVE-2020-17450", + "ASSIGNER": "cve@mitre.org", + "STATE": "RESERVED" + }, + "description": { + "description_data": [ + { + "lang": "eng", + "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17451.json b/2020/17xxx/CVE-2020-17451.json new file mode 100644 index 00000000000..efaa0d0c0be --- /dev/null +++ b/2020/17xxx/CVE-2020-17451.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-17451", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "flatCore before 1.5.7 allows XSS by an admin via the acp/acp.php?tn=pages&sub=edit&editpage=1 page_linkname, page_title, page_content, or page_extracontent parameter, or the acp/acp.php?tn=system&sub=sys_pref prefs_pagename, prefs_pagetitle, or prefs_pagesubtitle parameter." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.openwall.net/full-disclosure/2020/08/07/1", + "refsource": "MISC", + "name": "https://lists.openwall.net/full-disclosure/2020/08/07/1" + }, + { + "url": "https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-flatcore-cms/", + "refsource": "MISC", + "name": "https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-flatcore-cms/" + } + ] + } +} \ No newline at end of file diff --git a/2020/17xxx/CVE-2020-17452.json b/2020/17xxx/CVE-2020-17452.json new file mode 100644 index 00000000000..2a911156dce --- /dev/null +++ b/2020/17xxx/CVE-2020-17452.json @@ -0,0 +1,67 @@ +{ + "CVE_data_meta": { + "ASSIGNER": "cve@mitre.org", + "ID": "CVE-2020-17452", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "product": { + "product_data": [ + { + "product_name": "n/a", + "version": { + "version_data": [ + { + "version_value": "n/a" + } + ] + } + } + ] + }, + "vendor_name": "n/a" + } + ] + } + }, + "data_format": "MITRE", + "data_type": "CVE", + "data_version": "4.0", + "description": { + "description_data": [ + { + "lang": "eng", + "value": "flatCore before 1.5.7 allows upload and execution of a .php file by an admin." + } + ] + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "n/a" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "url": "https://lists.openwall.net/full-disclosure/2020/08/07/1", + "refsource": "MISC", + "name": "https://lists.openwall.net/full-disclosure/2020/08/07/1" + }, + { + "url": "https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-flatcore-cms/", + "refsource": "MISC", + "name": "https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-flatcore-cms/" + } + ] + } +} \ No newline at end of file