diff --git a/2017/14xxx/CVE-2017-14806.json b/2017/14xxx/CVE-2017-14806.json index d5e42fb59b6..f915e8867f6 100644 --- a/2017/14xxx/CVE-2017-14806.json +++ b/2017/14xxx/CVE-2017-14806.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.de", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2020-01-27T00:00:00.000Z", "ID": "CVE-2017-14806", "STATE": "PUBLIC", @@ -44,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "A Improper Certificate Validation vulnerability in susestudio-common of SUSE Studio onsite allows remote attackers to MITM connections to the repositories, which allows the modification of packages received over these connections.\nThis issue affects:\nSUSE Studio onsite\nsusestudio-common version 1.3.17-56.6.3 and prior versions." + "value": "A Improper Certificate Validation vulnerability in susestudio-common of SUSE Studio onsite allows remote attackers to MITM connections to the repositories, which allows the modification of packages received over these connections. This issue affects: SUSE Studio onsite susestudio-common version 1.3.17-56.6.3 and prior versions." } ] }, diff --git a/2017/14xxx/CVE-2017-14807.json b/2017/14xxx/CVE-2017-14807.json index 237c0ab844b..cc4326e6d67 100644 --- a/2017/14xxx/CVE-2017-14807.json +++ b/2017/14xxx/CVE-2017-14807.json @@ -1,6 +1,6 @@ { "CVE_data_meta": { - "ASSIGNER": "security@suse.de", + "ASSIGNER": "security@suse.com", "DATE_PUBLIC": "2020-01-27T00:00:00.000Z", "ID": "CVE-2017-14807", "STATE": "PUBLIC", @@ -44,7 +44,7 @@ "description_data": [ { "lang": "eng", - "value": "An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in susestudio-ui-server of SUSE Studio onsite allows remote attackers with admin privileges in Studio to alter SQL statements, allowing for extraction and modification of data.\nThis issue affects:\nSUSE Studio onsite\nsusestudio-ui-server version 1.3.17-56.6.3 and prior versions." + "value": "An Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in susestudio-ui-server of SUSE Studio onsite allows remote attackers with admin privileges in Studio to alter SQL statements, allowing for extraction and modification of data. This issue affects: SUSE Studio onsite susestudio-ui-server version 1.3.17-56.6.3 and prior versions." } ] }, diff --git a/2017/5xxx/CVE-2017-5645.json b/2017/5xxx/CVE-2017-5645.json index 6bdc5d85ea9..1e57c852c37 100644 --- a/2017/5xxx/CVE-2017-5645.json +++ b/2017/5xxx/CVE-2017-5645.json @@ -346,6 +346,11 @@ "refsource": "MLIST", "name": "[activemq-issues] 20200122 [jira] [Resolved] (AMQ-7372) [9.8] [CVE-2019-17571] [activemq-all] [5.15.10]", "url": "https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[activemq-issues] 20200127 [jira] [Commented] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571", + "url": "https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E" } ] } diff --git a/2019/17xxx/CVE-2019-17571.json b/2019/17xxx/CVE-2019-17571.json index aaf861d02bb..f641e7534c5 100644 --- a/2019/17xxx/CVE-2019-17571.json +++ b/2019/17xxx/CVE-2019-17571.json @@ -253,6 +253,11 @@ "refsource": "MLIST", "name": "[activemq-issues] 20200122 [jira] [Resolved] (AMQ-7372) [9.8] [CVE-2019-17571] [activemq-all] [5.15.10]", "url": "https://lists.apache.org/thread.html/r3d666e4e8905157f3c046d31398b04f2bfd4519e31f266de108c6919@%3Cissues.activemq.apache.org%3E" + }, + { + "refsource": "MLIST", + "name": "[activemq-issues] 20200127 [jira] [Commented] (AMQ-7370) log4j 1.2 version used by AMQ 5.15.10 / 5.15.11 is vulnerable to CVE-2019-17571", + "url": "https://lists.apache.org/thread.html/r61590890edcc64140e0c606954b29a063c3d08a2b41d447256d51a78@%3Cissues.activemq.apache.org%3E" } ] }, diff --git a/2019/6xxx/CVE-2019-6036.json b/2019/6xxx/CVE-2019-6036.json index e57c3062a63..8a368ff83e3 100644 --- a/2019/6xxx/CVE-2019-6036.json +++ b/2019/6xxx/CVE-2019-6036.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://f-revocrm.jp/2019/12/9393" + "url": "https://f-revocrm.jp/2019/12/9393", + "refsource": "MISC", + "name": "https://f-revocrm.jp/2019/12/9393" }, { - "url": "http://jvn.jp/en/jp/JVN97325754/index.html" + "url": "http://jvn.jp/en/jp/JVN97325754/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN97325754/index.html" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2019-6036", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/5xxx/CVE-2020-5520.json b/2020/5xxx/CVE-2020-5520.json index ba8abd435a0..b9c71cf5e5c 100644 --- a/2020/5xxx/CVE-2020-5520.json +++ b/2020/5xxx/CVE-2020-5520.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://www.printing.ne.jp/support/information/AppVulnerability.html" + "url": "https://www.printing.ne.jp/support/information/AppVulnerability.html", + "refsource": "MISC", + "name": "https://www.printing.ne.jp/support/information/AppVulnerability.html" }, { - "url": "http://jvn.jp/en/jp/JVN66435380/index.html" + "url": "http://jvn.jp/en/jp/JVN66435380/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN66435380/index.html" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5520", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/5xxx/CVE-2020-5521.json b/2020/5xxx/CVE-2020-5521.json index 1eb6290aa96..18b2c1325d2 100644 --- a/2020/5xxx/CVE-2020-5521.json +++ b/2020/5xxx/CVE-2020-5521.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://www.printing.ne.jp/support/information/AppVulnerability.html" + "url": "https://www.printing.ne.jp/support/information/AppVulnerability.html", + "refsource": "MISC", + "name": "https://www.printing.ne.jp/support/information/AppVulnerability.html" }, { - "url": "http://jvn.jp/en/jp/JVN66435380/index.html" + "url": "http://jvn.jp/en/jp/JVN66435380/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN66435380/index.html" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5521", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": { diff --git a/2020/5xxx/CVE-2020-5522.json b/2020/5xxx/CVE-2020-5522.json index 746e651eb27..e34c816d396 100644 --- a/2020/5xxx/CVE-2020-5522.json +++ b/2020/5xxx/CVE-2020-5522.json @@ -3,10 +3,14 @@ "references": { "reference_data": [ { - "url": "https://www.printing.ne.jp/support/information/AppVulnerability.html" + "url": "https://www.printing.ne.jp/support/information/AppVulnerability.html", + "refsource": "MISC", + "name": "https://www.printing.ne.jp/support/information/AppVulnerability.html" }, { - "url": "http://jvn.jp/en/jp/JVN66435380/index.html" + "url": "http://jvn.jp/en/jp/JVN66435380/index.html", + "refsource": "MISC", + "name": "http://jvn.jp/en/jp/JVN66435380/index.html" } ] }, @@ -44,7 +48,8 @@ }, "CVE_data_meta": { "ID": "CVE-2020-5522", - "ASSIGNER": "vultures@jpcert.or.jp" + "ASSIGNER": "vultures@jpcert.or.jp", + "STATE": "PUBLIC" }, "data_format": "MITRE", "problemtype": {